Nothing Special   »   [go: up one dir, main page]

Next Issue
Volume 13, September
Previous Issue
Volume 13, July
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 

Computers, Volume 13, Issue 8 (August 2024) – 31 articles

Cover Story (view full-size image): As the global deployment of Fifth-Generation (5G) technology continues, the exploration of potential Sixth-Generation (6G) wireless networks has begun. Sixth-Generation technology aims to surpass 5G by providing a ubiquitous communication experience through integrating diverse Radio Access Networks (RANs) and fixed-access networks, creating a “network of networks.” This paper proposes a novel user plane protocol architecture called 6G Recursive User Plane Architecture (6G-RUPA). It focuses on scalability, flexibility, and energy efficiency, improving network federation, protocol overhead, and mobility management mechanisms, among other elements. 6G-RUPA enhances overall performance and sustainability, bringing mobile networks one step closer to the “network of networks” vision. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
31 pages, 13095 KiB  
Article
Self-Adaptive Evolutionary Info Variational Autoencoder
by Toby A. Emm and Yu Zhang
Computers 2024, 13(8), 214; https://doi.org/10.3390/computers13080214 - 22 Aug 2024
Viewed by 924
Abstract
With the advent of increasingly powerful machine learning algorithms and the ability to rapidly obtain accurate aerodynamic performance data, there has been a steady rise in the use of algorithms for automated aerodynamic design optimisation. However, long training times, high-dimensional design spaces and [...] Read more.
With the advent of increasingly powerful machine learning algorithms and the ability to rapidly obtain accurate aerodynamic performance data, there has been a steady rise in the use of algorithms for automated aerodynamic design optimisation. However, long training times, high-dimensional design spaces and rapid geometry alteration pose barriers to this becoming an efficient and worthwhile process. The variational autoencoder (VAE) is a probabilistic generative model capable of learning a low-dimensional representation of high-dimensional input data. Despite their impressive power, VAEs suffer from several issues, resulting in poor model performance and limiting optimisation capability. Several approaches have been proposed in attempts to fix these issues. This study combines the approaches of loss function modification with evolutionary hyperparameter tuning, introducing a new self-adaptive evolutionary info variational autoencoder (SA-eInfoVAE). The proposed model is validated against previous models on the MNIST handwritten digits dataset, assessing the total model performance. The proposed model is then applied to an aircraft image dataset to assess the applicability and complications involved with complex datasets such as those used for aerodynamic design optimisation. The results obtained on the MNIST dataset show improved inference in conjunction with increased generative and reconstructive performance. This is validated through a thorough comparison against baseline models, including quantitative metrics reconstruction error, loss function calculation and disentanglement percentage. A number of qualitative image plots provide further comparison of the generative and reconstructive performance, as well as the strength of latent encodings. Furthermore, the results on the aircraft image dataset show the proposed model can produce high-quality reconstructions and latent encodings. The analysis suggests, given a high-quality dataset and optimal network structure, the proposed model is capable of outperforming the current VAE models, reducing the training time cost and improving the quality of automated aerodynamic design optimisation. Full article
Show Figures

Figure 1

Figure 1
<p>Workflow for automated aerodynamic design optimisation using a variational autoencoder (VAE).</p>
Full article ">Figure 2
<p>Workflow representation of the variational autoencoder (VAE) model detailing the process of the re-parameterisation trick. The result of this is <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>z</mi> </mrow> <mrow> <mi>*</mi> </mrow> </msup> </mrow> </semantics></math>, computed by the workflow and designated a star to show it is representative of—not a true member of the distribution <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>q</mi> </mrow> <mrow> <mi>ϕ</mi> </mrow> </msub> <mo stretchy="false">(</mo> <mi>z</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Workflow detailing the inner–outer training loop used in the eVAE model. The result of the cycle is <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>β</mi> </mrow> <mrow> <mi>*</mi> </mrow> </msup> </mrow> </semantics></math>, representing the best hyperparameter solution of the chromosome population, selected as the start of the next cycle. The red and blue distributions provide an intuitive representation of the crossover operation for distributions.</p>
Full article ">Figure 4
<p>Workflow of the proposed self-adaptive evolutionary info variational autoencoder model. Similarly to the eVAE model, <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>α</mi> </mrow> <mrow> <mi>*</mi> </mrow> </msup> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>λ</mi> </mrow> <mrow> <mi>*</mi> </mrow> </msup> </mrow> </semantics></math> represent the strongest hyperparameter pair of the population and are selected to be the starting point of the next cycle. Again, the distribution in the bottom right depicts the variational crossover operation for distributions.</p>
Full article ">Figure 5
<p>Structure of the neural network used for model comparison on the MNIST dataset.</p>
Full article ">Figure 6
<p>Structure of the neural network used for the ShapeNetCore aircraft image dataset.</p>
Full article ">Figure 7
<p>Comparison of the ELBO objective loss function values over a period of 20 training epochs.</p>
Full article ">Figure 8
<p>Evolution of the <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">α</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>λ</mi> </mrow> </semantics></math> hyperparameters over the course of the training run.</p>
Full article ">Figure 9
<p>Generated image samples from (<b>a</b>) VAE, (<b>b</b>) untuned InfoVAE, (<b>c</b>) tuned InfoVAE, (<b>d</b>) standard SBX eInfoVAE, (<b>e</b>) <math display="inline"><semantics> <mrow> <mi>β</mi> </mrow> </semantics></math>-VAE, (<b>f</b>) eVAE and (<b>g</b>) SA-eInfoVAE, and (<b>h</b>) ground truth images from the MNIST dataset.</p>
Full article ">Figure 9 Cont.
<p>Generated image samples from (<b>a</b>) VAE, (<b>b</b>) untuned InfoVAE, (<b>c</b>) tuned InfoVAE, (<b>d</b>) standard SBX eInfoVAE, (<b>e</b>) <math display="inline"><semantics> <mrow> <mi>β</mi> </mrow> </semantics></math>-VAE, (<b>f</b>) eVAE and (<b>g</b>) SA-eInfoVAE, and (<b>h</b>) ground truth images from the MNIST dataset.</p>
Full article ">Figure 10
<p>Comparison of the original input images and reconstructions from (<b>a</b>) VAE, (<b>b</b>) untuned InfoVAE, (<b>c</b>) tuned InfoVAE, (<b>d</b>) <math display="inline"><semantics> <mrow> <mi>β</mi> </mrow> </semantics></math>-VAE, (<b>e</b>) eVAE, (<b>f</b>) standard SBX eInfoVAE and (<b>g</b>) SA-eInfoVAE.</p>
Full article ">Figure 11
<p>Comparison of the visualised approximate prior distributions of the seven models with the ground truth prior.</p>
Full article ">Figure 12
<p>Comparisons of the latent traversals of (<b>a</b>) VAE, (<b>b</b>) untuned InfoVAE, (<b>c</b>) tuned InfoVAE, (<b>d</b>) standard SBX eInfoVAE, (<b>e</b>) <math display="inline"><semantics> <mrow> <mi>β</mi> </mrow> </semantics></math>-VAE, (<b>f</b>) eVAE and (<b>g</b>) self-adaptive SBX eInfoVAE.</p>
Full article ">Figure 12 Cont.
<p>Comparisons of the latent traversals of (<b>a</b>) VAE, (<b>b</b>) untuned InfoVAE, (<b>c</b>) tuned InfoVAE, (<b>d</b>) standard SBX eInfoVAE, (<b>e</b>) <math display="inline"><semantics> <mrow> <mi>β</mi> </mrow> </semantics></math>-VAE, (<b>f</b>) eVAE and (<b>g</b>) self-adaptive SBX eInfoVAE.</p>
Full article ">Figure 13
<p>Comparison of the original input images and the reconstructions form the SA-eInfoVAE model on the ShapeNetCore aircraft image dataset.</p>
Full article ">Figure 14
<p>Visualisation of the latent space for the SA-eInfoVAE model on the ShapeNetCore aircraft image dataset.</p>
Full article ">
29 pages, 742 KiB  
Review
Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review
by Munirah Maher Alshabibi, Alanood Khaled Bu dookhi and M. M. Hafizur Rahman
Computers 2024, 13(8), 213; https://doi.org/10.3390/computers13080213 - 22 Aug 2024
Viewed by 6415
Abstract
Cloud computing technology delivers services, resources, and computer systems over the internet, enabling the easy modification of resources. Each field has its challenges, and the challenges of data transfer in the cloud pose unique obstacles for forensic analysts, making it necessary for them [...] Read more.
Cloud computing technology delivers services, resources, and computer systems over the internet, enabling the easy modification of resources. Each field has its challenges, and the challenges of data transfer in the cloud pose unique obstacles for forensic analysts, making it necessary for them to investigate and adjust the evolving landscape of cloud computing. This is where cloud forensics emerges as a critical component. Cloud forensics, a specialized field within digital forensics, focuses on uncovering evidence of exploitation, conducting thorough investigations, and presenting findings to law enforcement for legal action against perpetrators. This paper examines the primary challenges encountered in cloud forensics, reviews the relevant literature, and analyzes the strategies implemented to address these obstacles. Full article
Show Figures

Figure 1

Figure 1
<p>Selection of papers for review using PRISMA model.</p>
Full article ">Figure 2
<p>Percentage of each type.</p>
Full article ">Figure 3
<p>Various challenges for each type.</p>
Full article ">Figure 4
<p>Most commonly used techniques.</p>
Full article ">
22 pages, 1588 KiB  
Article
Investigating the Challenges and Opportunities in Persian Language Information Retrieval through Standardized Data Collections and Deep Learning
by Sara Moniri, Tobias Schlosser and Danny Kowerko
Computers 2024, 13(8), 212; https://doi.org/10.3390/computers13080212 - 21 Aug 2024
Viewed by 1328
Abstract
The Persian language, also known as Farsi, is distinguished by its intricate morphological richness, yet it contends with a paucity of linguistic resources. With an estimated 110 million speakers, it finds prevalence across Iran, Tajikistan, Uzbekistan, Iraq, Russia, Azerbaijan, and Afghanistan. However, despite [...] Read more.
The Persian language, also known as Farsi, is distinguished by its intricate morphological richness, yet it contends with a paucity of linguistic resources. With an estimated 110 million speakers, it finds prevalence across Iran, Tajikistan, Uzbekistan, Iraq, Russia, Azerbaijan, and Afghanistan. However, despite its widespread usage, scholarly investigations into Persian document retrieval remain notably scarce. This circumstance is primarily attributed to the absence of standardized test collections, which impedes the advancement of comprehensive research endeavors within this realm. As data corpora are the foundation of natural language processing applications, this work aims at Persian language datasets to address their availability and structure. Subsequently, we motivate a learning-based framework for the processing of Persian texts and their recognition, for which current state-of-the-art approaches from deep learning, such as deep neural networks, are further discussed. Our investigations highlight the challenges of realizing such a system while emphasizing its possible benefits for an otherwise rarely covered language. Full article
Show Figures

Figure 1

Figure 1
<p>Illustration of different Persian language datasets. The examples have been obtained from the datasets’ project pages and repositories: Arshasb [<a href="#B21-computers-13-00212" class="html-bibr">21</a>] (<b>top left</b>, <a href="https://github.com/persiandataset/Arshasb" target="_blank">https://github.com/persiandataset/Arshasb</a>, accessed on 31 May 2024), IDPL-PFOD [<a href="#B22-computers-13-00212" class="html-bibr">22</a>] (<b>bottom left</b>, <a href="https://github.com/FtmsdtHosseini/IDPL-PFOD" target="_blank">https://github.com/FtmsdtHosseini/IDPL-PFOD</a>, accessed on 31 May 2024), persis [<a href="#B23-computers-13-00212" class="html-bibr">23</a>] (<b>top right</b>, <a href="https://github.com/mehrdad-dev/persis" target="_blank">https://github.com/mehrdad-dev/persis</a>, accessed on 31 May 2024), and Iranis-dataset [<a href="#B24-computers-13-00212" class="html-bibr">24</a>] (<b>bottom right</b>, <a href="https://github.com/alitourani/Iranis-dataset" target="_blank">https://github.com/alitourani/Iranis-dataset</a>, accessed on 31 May 2024).</p>
Full article ">Figure 2
<p>The English, Persian, and Arabic alphabets in comparison. (<b>a</b>) The English alphabet with upper and lower case letters. (<b>b</b>) The Persian alphabet. (<b>c</b>) The Arabic alphabet. In comparison to Persian, red letters are omitted in the Arabic language.</p>
Full article ">Figure 3
<p>In comparison to English, Persian (<b>top</b>) and Arabic (<b>bottom</b>) are written from right to left. The provided text states, in Persian and Arabic, “[The] Persian language is written and read from right to left”, which is transliterated as “zabān-e fārsi neveshteh va khāndeh az rāst be chap” (Persian) and “al-lughat al-arabiyyah tuktabu wa tuqra min al-yameen ila al-yasaar” (Arabic).</p>
Full article ">Figure 4
<p>Construction of Persian letters with the forms isolated, initial, medial, and final.</p>
Full article ">Figure 5
<p>Performance comparison of learning-based approaches on different Persian datasets from <a href="#sec5dot3-computers-13-00212" class="html-sec">Section 5.3</a>. The best <span class="html-italic">k</span>-NN (1-NN) [<a href="#B49-computers-13-00212" class="html-bibr">49</a>], naive Bayes [<a href="#B49-computers-13-00212" class="html-bibr">49</a>], SVC [<a href="#B49-computers-13-00212" class="html-bibr">49</a>], CNN [<a href="#B22-computers-13-00212" class="html-bibr">22</a>], and RNN (LSTM) [<a href="#B67-computers-13-00212" class="html-bibr">67</a>] scores are reported in accuracy, while the best transformer score (ParsBERT) [<a href="#B37-computers-13-00212" class="html-bibr">37</a>] is reported in F1-score. Please note: As different evaluation scores have been provided by the respective works, with all scores, except for the transformer [<a href="#B37-computers-13-00212" class="html-bibr">37</a>], being reported in accuracy, a direct comparison of all results is difficult.</p>
Full article ">
24 pages, 22050 KiB  
Article
SOD: A Corpus for Saudi Offensive Language Detection Classification
by Afefa Asiri and Mostafa Saleh
Computers 2024, 13(8), 211; https://doi.org/10.3390/computers13080211 - 20 Aug 2024
Viewed by 752
Abstract
Social media platforms like X (formerly known as Twitter) are integral to modern communication, enabling the sharing of news, emotions, and ideas. However, they also facilitate the spread of harmful content, and manual moderation of these platforms is impractical. Automated moderation tools, predominantly [...] Read more.
Social media platforms like X (formerly known as Twitter) are integral to modern communication, enabling the sharing of news, emotions, and ideas. However, they also facilitate the spread of harmful content, and manual moderation of these platforms is impractical. Automated moderation tools, predominantly developed for English, are insufficient for addressing online offensive language in Arabic, a language rich in dialects and informally used on social media. This gap underscores the need for dedicated, dialect-specific resources. This study introduces the Saudi Offensive Dialectal dataset (SOD), consisting of over 24,000 tweets annotated across three levels: offensive or non-offensive, with offensive tweets further categorized as general insults, hate speech, or sarcasm. A deeper analysis of hate speech identifies subtypes related to sports, religion, politics, race, and violence. A comprehensive descriptive analysis of the SOD is also provided to offer deeper insights into its composition. Using machine learning, traditional deep learning, and transformer-based deep learning models, particularly AraBERT, our research achieves a significant F1-Score of 87% in identifying offensive language. This score improves to 91% with data augmentation techniques addressing dataset imbalances. These results, which surpass many existing studies, demonstrate that a specialized dialectal dataset enhances detection efficacy compared to mixed-language datasets. Full article
(This article belongs to the Special Issue Natural Language Processing (NLP) and Large Language Modelling)
Show Figures

Figure 1

Figure 1
<p>Leading Countries based on number of X, formerly Twitter, users: January 2023, in millions [<a href="#B15-computers-13-00211" class="html-bibr">15</a>].</p>
Full article ">Figure 2
<p>Percentage of Arabic corpora based on the type of corpus, from 2002 to 2019 [<a href="#B18-computers-13-00211" class="html-bibr">18</a>].</p>
Full article ">Figure 3
<p>Workflow of the data collection process.</p>
Full article ">Figure 4
<p>Hierarchical annotation structure.</p>
Full article ">Figure 5
<p>Saudi Offensive Dataset [SOD]—classes percentage.</p>
Full article ">Figure 6
<p>Saudi Offensive Dataset [SOD]—tweet length distribution.</p>
Full article ">Figure 7
<p>Saudi Offensive Dataset [SOD]—word count distribution.</p>
Full article ">Figure 8
<p>N-gram word cloud—all tweets.</p>
Full article ">Figure 9
<p>N-gram word cloud—offensive tweets.</p>
Full article ">Figure 10
<p>N-gram word cloud—hate speech tweet.</p>
Full article ">Figure 11
<p>Performance of ML, DL, and transformer model in Saudi dialect tweet classification.</p>
Full article ">
29 pages, 1108 KiB  
Article
Improved Hybrid Bagging Resampling Framework for Deep Learning-Based Side-Channel Analysis
by Faisal Hameed, Sumesh Manjunath Ramesh and Hoda Alkhzaimi
Computers 2024, 13(8), 210; https://doi.org/10.3390/computers13080210 - 20 Aug 2024
Viewed by 640
Abstract
As cryptographic implementations leak secret information through side-channel emissions, the Hamming weight (HW) leakage model is widely used in deep learning profiling side-channel analysis (SCA) attacks to expose the leaked model. However, imbalanced datasets often arise from the HW leakage model, increasing the [...] Read more.
As cryptographic implementations leak secret information through side-channel emissions, the Hamming weight (HW) leakage model is widely used in deep learning profiling side-channel analysis (SCA) attacks to expose the leaked model. However, imbalanced datasets often arise from the HW leakage model, increasing the attack complexity and limiting the performance of deep learning-based SCA attacks. Effective management of class imbalance is vital for training deep neural network models to achieve optimized and improved performance results. Recent works focus on either improved deep-learning methodologies or data augmentation techniques. In this work, we propose the hybrid bagging resampling framework, a two-pronged strategy for tackling class imbalance in side-channel datasets, consisting of data augmentation and ensemble learning. We show that adopting this framework can boost attack performance results in a practical setup. From our experimental results, the SMOTEENN ensemble achieved the best performance in the ASCAD dataset, and the basic ensemble performed the best in the CHES dataset, with both contributing over 70% practical improvements in performance compared to the original imbalanced dataset, and accelerating practical attack space in comparison to the classical setup of the attack. Full article
Show Figures

Figure 1

Figure 1
<p>The architecture flow for profiling side-channel analysis and a sample power trace. (<b>a</b>) The profiling side-channel analysis. (<b>b</b>) Simple Power Trace.</p>
Full article ">Figure 2
<p>CHES in its imbalanced state.</p>
Full article ">Figure 3
<p>The before and after effect of various data resampling methods on CHES dataset.</p>
Full article ">Figure 4
<p>Resampling and ensembling improving performance. (<b>a</b>) MLP: resampled against imbalance data. (<b>b</b>) MLP: one against ensemble.</p>
Full article ">Figure 5
<p>ASCAD: MLP ensembling on basic.</p>
Full article ">Figure 6
<p>ASCAD: CNN ensembling on basic.</p>
Full article ">Figure 7
<p>ASCAD: MLP ensemble using Noise Sampling.</p>
Full article ">Figure 8
<p>ASCAD: CNN ensemble using Noise Sampling.</p>
Full article ">Figure 9
<p>ASCAD: MLP ensembling using SMOTE.</p>
Full article ">Figure 10
<p>ASCAD: CNN ensembling using SMOTE.</p>
Full article ">Figure 11
<p>ASCAD: MLP ensembling using SMOTEENN.</p>
Full article ">Figure 12
<p>ASCAD: CNN ensembling using SMOTEENN.</p>
Full article ">Figure 13
<p>ASCAD: MLP ensemble using Random Oversampling.</p>
Full article ">Figure 14
<p>ASCAD: CNN ensemble using Random Oversampling.</p>
Full article ">Figure 15
<p>ASCAD: MLP ensemble using Random Undersampling.</p>
Full article ">Figure 16
<p>ASCAD: CNN ensemble using Random Undersampling.</p>
Full article ">Figure 17
<p>The Shapley values of Ensemble 1 and 20. (<b>a</b>) Shapley Values of E1. (<b>b</b>) Shapley Values of E20.</p>
Full article ">Figure 18
<p>Statistical significance test of data resampling and machine learning ensembles. (<b>a</b>) MLP: resampled against imbalance data. (<b>b</b>) MLP-One model against ensemble of models.</p>
Full article ">
13 pages, 2278 KiB  
Article
Developing and Testing a Portable Soil Nutrient Detector in Irrigated and Rainfed Paddy Soils from Java, Indonesia
by Yiyi Sulaeman, Eko Sutanto, Antonius Kasno, Nandang Sunandar and Runik D. Purwaningrahayu
Computers 2024, 13(8), 209; https://doi.org/10.3390/computers13080209 - 20 Aug 2024
Viewed by 960
Abstract
Data on the soil nutrient content are required to calculate fertilizer rate recommendations. The soil laboratory determines these soil properties, yet the measurement is time-consuming and costly. Meanwhile, portable devices to assess the soil nutrient content in real-time are limited. However, a proprietary [...] Read more.
Data on the soil nutrient content are required to calculate fertilizer rate recommendations. The soil laboratory determines these soil properties, yet the measurement is time-consuming and costly. Meanwhile, portable devices to assess the soil nutrient content in real-time are limited. However, a proprietary and low-cost NPK sensor is available and commonly used in IoT for agriculture. This study aimed to assemble and test a portable, NPK sensor-based device in irrigated and rainfed paddy soils from Java, Indonesia. The device development followed a prototyping approach. The device building included market surveys and opted for an inexpensive, light, and compact soil sensor, power storage, monitor, and wire connectors. Arduino programming language was used to write scripts for data display and sub-device communication. The result is a real-time, portable soil nutrient detector that measures the soil temperature, moisture, pH, electrical conductivity, and N, P, and K contents. Field tests show that the device is sensitive to soil properties and location. The portable soil nutrient detector may be an alternative tool for the real-time measurement of soil nutrients in paddy fields in Indonesia. Full article
Show Figures

Figure 1

Figure 1
<p>The steps for the device to develop a portable soil nutrient detector in rice fields start from the initial investigation, requirement analysis, system design, coding, testing, and maintenance.</p>
Full article ">Figure 2
<p>The test locations, presented in red dots, of the portable soil nutrient detector in paddy fields represent the northern and southern coastal areas of Java, as well as the highland areas of the rice production centers. Testing sites are plotted on the OpenStreetMap.</p>
Full article ">Figure 3
<p>A portable soil nutrient detector prototype to rapidly detect soil nutrients and provide fertilizer recommendations for rice, corn, soybean, mungbean, and sweet potato crops.</p>
Full article ">Figure 4
<p>The relationships between the water content and N, P, K, and EC, as measured by the portable soil nutrient detector, in the paddy field. Note: * means that the variation of the y-axis can be explained significantly by the formula at an alpha of 0.05.</p>
Full article ">Figure 5
<p>The relationship between soil electrical conductivity with pH, N, P, and K nutrients, as measured by the portable soil nutrient detector in the paddy field. * Means that the variation of the y-axis can be explained significantly by the formula at an alpha of 0.05.</p>
Full article ">
26 pages, 3806 KiB  
Article
Proposed Supercluster-Based UMBBFS Routing Protocol for Emergency Message Dissemination in Edge-RSU for 5G VANET
by Maath A. Albeyar, Ikram Smaoui, Hassene Mnif and Sameer Alani
Computers 2024, 13(8), 208; https://doi.org/10.3390/computers13080208 - 19 Aug 2024
Viewed by 663
Abstract
Vehicular ad hoc networks (VANETs) can bolster road safety through the proactive dissemination of emergency messages (EMs) among vehicles, effectively reducing the occurrence of traffic-related accidents. It is difficult to transmit EMs quickly and reliably due to the high-speed mobility of VANET and [...] Read more.
Vehicular ad hoc networks (VANETs) can bolster road safety through the proactive dissemination of emergency messages (EMs) among vehicles, effectively reducing the occurrence of traffic-related accidents. It is difficult to transmit EMs quickly and reliably due to the high-speed mobility of VANET and the attenuation of the wireless signal. However, poor network design and high vehicle mobility are the two most difficult problems that affect VANET’s network performance. The real-time traffic situation and network dependability will also be significantly impacted by route selection and message delivery. Many of the current works have undergone studies focused on forwarder selection and message transmission to address these problems. However, these earlier approaches, while effective in forwarder selection and routing, have overlooked the critical aspects of communication overhead and excessive energy consumption, resulting in transmission delays. To address the prevailing challenges, the proposed solutions use edge computing to process and analyze data locally from surrounding cars and infrastructure. EDGE-RSUs are positioned by the side of the road. In intelligent transportation systems, this lowers latency and enhances real-time decision-making by employing proficient forwarder selection techniques and optimizing the dissemination of EMs. In the context of 5G-enabled VANET, this paper introduces a novel routing protocol, namely, the supercluster-based urban multi-hop broadcast and best forwarder selection protocol (UMB-BFS). The improved twin delay deep deterministic policy gradient (IT3DPG) method is used to select the target region for emergency message distribution after route selection. Clustering is conducted using modified density peak clustering (MDPC). Improved firefly optimization (IFO) is used for optimal path selection. In this way, all emergency messages are quickly disseminated to multiple directions and also manage the traffic in VANET. Finally, we plotted graphs for the following metrics: throughput (3.9 kbps), end-to-end delay (70), coverage (90%), packet delivery ratio (98%), packet received (12.75 k), and transmission delay (57 ms). Our approach’s performance is examined using numerical analysis, demonstrating that it performs better than the current methodologies across all measures. Full article
Show Figures

Figure 1

Figure 1
<p>Supercluster.</p>
Full article ">Figure 2
<p>Multi-hop broadcast.</p>
Full article ">Figure 3
<p>Improved firefly optimization framework.</p>
Full article ">Figure 4
<p>Experimental simulation scenario.</p>
Full article ">Figure 5
<p>Number of vehicles vs. throughput.</p>
Full article ">Figure 6
<p>Vehicle density vs. end-to-end delay.</p>
Full article ">Figure 7
<p>Vehicle density vs. coverage (%).</p>
Full article ">Figure 8
<p>Vehicle density vs. packet delivery ratio (%).</p>
Full article ">Figure 9
<p>Number of vehicles vs. packet received.</p>
Full article ">Figure 10
<p>Vehicles density vs. transmission delay (ms).</p>
Full article ">Figure 11
<p>Confidence intervals.</p>
Full article ">
17 pages, 2893 KiB  
Article
Student Teachers’ Perceptions of a Game-Based Exam in the Genial.ly App
by Elina Gravelsina and Linda Daniela
Computers 2024, 13(8), 207; https://doi.org/10.3390/computers13080207 - 19 Aug 2024
Viewed by 1049
Abstract
This research examines student teachers’ perceptions of a game-based exam conducted in the Genial.ly app in the study course ”Legal Aspects of the Pedagogical Process”. This study aims to find out the pros and cons of game-based exams and understand which digital solutions [...] Read more.
This research examines student teachers’ perceptions of a game-based exam conducted in the Genial.ly app in the study course ”Legal Aspects of the Pedagogical Process”. This study aims to find out the pros and cons of game-based exams and understand which digital solutions can enable the development and analysis of digital game data. At the beginning of the course, students were introduced to the research and asked to provide feedback throughout the course on what they saw as the most important aspects of each class and insights on how they envisioned the game-based exam could proceed. The game-based exam was built using the digital platform Genial.ly after its update, which provided the possibility to include open-ended questions and collect data for analyses. It was designed with a narrative in which a new teacher comes to a school and is asked for help in different situations. After reading a description of each situation, the students answered questions about how they would resolve them based on Latvia’s regulations. After the exam, students wrote feedback indicating that the game-based exam helped them visualize the situations presented, resulting in lower stress levels compared to a traditional exam. This research was structured based on design-based principles and the data were analyzed from the perspective of how educators can use freely available solutions to develop game-based exams to test students’ knowledge gained during a course. The results show that Genial.ly can be used as an examination tool, as indicated by positive student teachers’ responses. However, this research has limitations as it was conducted with only one test group due to administrative reasons. Future research could address this by including multiple groups within the same course as well as testing game-based exams in other subject courses for comparison. Full article
(This article belongs to the Special Issue Smart Learning Environments)
Show Figures

Figure 1

Figure 1
<p>Overview of the design-based research method with 3 main phases and connected parts.</p>
Full article ">Figure 2
<p>Feedback and analysis from Genial.ly’s “individual activity” view that includes answers to both test-based questions and open-ended questions where students provided their opinions.</p>
Full article ">Figure 3
<p>The game visualizes a conversation in the hallway.</p>
Full article ">Figure 4
<p>The game progress indicator, displayed in the upper left corner.</p>
Full article ">Figure 5
<p>Inability to customize the words of the interactive question interface.</p>
Full article ">
21 pages, 3069 KiB  
Article
Caputo Fabrizio Bézier Curve with Fractional and Shape Parameters
by Muhammad Awais, Syed Khawar Nadeem Kirmani, Maheen Rana and Raheel Ahmad
Computers 2024, 13(8), 206; https://doi.org/10.3390/computers13080206 - 19 Aug 2024
Viewed by 610
Abstract
In recent research in computer-aided geometric design (CAGD), one of the most popular concerns has been the creation of new basis functions for the Bézier curve. Bézier curves with high degrees often overshoot, which makes it challenging to maintain control over the ideal [...] Read more.
In recent research in computer-aided geometric design (CAGD), one of the most popular concerns has been the creation of new basis functions for the Bézier curve. Bézier curves with high degrees often overshoot, which makes it challenging to maintain control over the ideal length of the curved trajectory. To get around this restriction, free-form surfaces and curves can be created using the Caputo Fabrizio basis function. In this study, the Caputo Fabrizio fractional order derivative is used to construct the Caputo Fabrizio basis function, which contains fractional parameter and shape parameters. The Caputo Fabrizio Bézier curve and surface are defined using the Caputo Fabrizio basis function, and their geometric properties are examined. Using fractional and shape parameters in the implementation of the Caputo Fabrizio basis function offers an alternative perspective on how the Caputo Fabrizio basis function can construct complicated curves and surfaces beyond a limited formulation. Curves and surfaces can have additional shape and length control by adjusting a number of fractional and shape parameters without affecting their control points. The Caputo Fabrizio Bézier curve’s flexibility and versatility make it more effective in creating complex engineering curves and surfaces. Full article
Show Figures

Figure 1

Figure 1
<p>Quadratic Caputo Fabrizio basis with different values of shape parameters (<math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>2</mn> </msub> </semantics></math>) and fractional parameter (<math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math>).</p>
Full article ">Figure 2
<p>Cubic Caputo Fabrizio basis with different values of <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math> (fractional parameter) and <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>2</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>3</mn> </msub> </semantics></math> (shape parameters).</p>
Full article ">Figure 2 Cont.
<p>Cubic Caputo Fabrizio basis with different values of <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math> (fractional parameter) and <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>2</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>3</mn> </msub> </semantics></math> (shape parameters).</p>
Full article ">Figure 3
<p>Quartic Caputo Fabrizio basis with different values of <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math> (fractional parameter) and <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>2</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>3</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>4</mn> </msub> </semantics></math> (shape parameters).</p>
Full article ">Figure 4
<p>Classical quadratic Bézier curve.</p>
Full article ">Figure 5
<p>Quadratic Caputo Fabrizio Bézier curve at <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.6</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Quadratic Caputo Fabrizio Bézier curve at <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.7</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.998</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Classical Cubic Bézier curve.</p>
Full article ">Figure 8
<p>Cubic Caputo Fabrizio Bézier curves at different values of fractional parameter <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math> and shape parameters <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>2</mn> </msub> </semantics></math>, and <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>3</mn> </msub> </semantics></math>.</p>
Full article ">Figure 9
<p>Quintic Caputo Fabrizio Bézier curves at various values of fractional parameter <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math> and shape parameters <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>2</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>3</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>4</mn> </msub> </semantics></math>, and <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>5</mn> </msub> </semantics></math>.</p>
Full article ">Figure 10
<p>Quartic Caputo Fabrizio Bézier curves with various values of fractional parameter <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math> = 0.1, 0.2, 0.36, and 0.49.</p>
Full article ">Figure 11
<p>Quartic Caputo Fabrizio Bézier curves with various values of fractional parameter <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math> = 0.1, 0.2, 0.3, 0.4, 0.5, and 0.6.</p>
Full article ">Figure 12
<p>Surface of revolution of cubic Caputo Fabrizio Bézier curve at various values of fractional parameter <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math>.</p>
Full article ">Figure 13
<p>Surface of revolution of cubic Caputo Fabrizio Bézier curve at various values of <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math> and shape parameters <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>1</mn> </msub> <mo>=</mo> <mo>−</mo> <mn>0.25</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>2</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>3</mn> </msub> <mo>=</mo> <mo>−</mo> <mn>1.5</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 14
<p>Extruded surface created by using a cubic Caputo Fabrizio Bézier curve at <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math> = 0.1, 0.3, 0.45, 0.6.</p>
Full article ">Figure 15
<p>Extruded surface created by using a cubic Caputo Fabrizio Bézier curve at <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math> = 0.7, 0.8, 0.9, 0.96.</p>
Full article ">Figure 15 Cont.
<p>Extruded surface created by using a cubic Caputo Fabrizio Bézier curve at <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math> = 0.7, 0.8, 0.9, 0.96.</p>
Full article ">Figure 16
<p>Extruded surface created by using a cubic Caputo Fabrizio Bézier curve at <math display="inline"><semantics> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> </semantics></math> = 0.1, 0.3, 0.45, 0.6 and shape parameters values <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>1</mn> </msub> <mo>=</mo> <mo>−</mo> <mn>0.29</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>2</mn> </msub> <mo>=</mo> <mn>1.9</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>3</mn> </msub> <mo>=</mo> <mo>−</mo> <mn>0.9</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 17
<p>Paths that navigate around obstacles, created using quintic Caputo Fabrizio Bézier curves with varying shape and fractional parameters.</p>
Full article ">Figure 18
<p>Paths that navigate around obstacles, created using quintic Caputo Fabrizio Bézier curves at <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.1</mn> </mrow> </semantics></math> (fractional parameter) and different values of shape parameters <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>2</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>3</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>4</mn> </msub> </semantics></math>, and <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>5</mn> </msub> </semantics></math>.</p>
Full article ">Figure 19
<p>Paths that navigate around obstacles, created using quintic Caputo Fabrizio Bézier curves at <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.65</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.7</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math> (fractional parameter) and different values of shape parameters <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>2</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>3</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>4</mn> </msub> </semantics></math>, and <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>5</mn> </msub> </semantics></math>.</p>
Full article ">Figure 19 Cont.
<p>Paths that navigate around obstacles, created using quintic Caputo Fabrizio Bézier curves at <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.65</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.7</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>w</mi> <mo>˜</mo> </mover> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math> (fractional parameter) and different values of shape parameters <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>2</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>3</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>4</mn> </msub> </semantics></math>, and <math display="inline"><semantics> <msub> <mover accent="true"> <mi>r</mi> <mo>˜</mo> </mover> <mn>5</mn> </msub> </semantics></math>.</p>
Full article ">
15 pages, 3941 KiB  
Article
An Educational Escape Room Game to Develop Cybersecurity Skills
by Alessia Spatafora, Markus Wagemann, Charlotte Sandoval, Manfred Leisenberg and Carlos Vaz de Carvalho
Computers 2024, 13(8), 205; https://doi.org/10.3390/computers13080205 - 19 Aug 2024
Viewed by 1180
Abstract
The global rise in cybercrime is fueled by the pervasive digitization of work and personal life, compounded by the shift to online formats during the COVID-19 pandemic. As digital channels flourish, so too do the opportunities for cyberattacks, particularly those exposing small and [...] Read more.
The global rise in cybercrime is fueled by the pervasive digitization of work and personal life, compounded by the shift to online formats during the COVID-19 pandemic. As digital channels flourish, so too do the opportunities for cyberattacks, particularly those exposing small and medium-sized enterprises (SMEs) to potential economic devastation. These businesses often lack comprehensive defense strategies and/or the necessary resources to implement effective cybersecurity measures. The authors have addressed this issue by developing an Educational Escape Room (EER) that supports scenario-based learning to enhance cybersecurity awareness among SME employees, enabling them to handle cyber threats more effectively. By integrating hands-on scenarios based on real-life examples, the authors aimed to improve the knowledge retention and the operational performance of SME staff in terms of cybersafe practices. The results achieved during pilot testing with more than 200 participants suggest that the EER approach engaged the trainees and boosted their cybersecurity awareness, marking a step forward in cybersecurity education. Full article
(This article belongs to the Special Issue Game-Based Learning, Gamification in Education and Serious Games 2023)
Show Figures

Figure 1

Figure 1
<p>Starting the first episode.</p>
Full article ">Figure 2
<p>The player’s work environment in the bank.</p>
Full article ">Figure 3
<p>Game players throughout the entire testing period with special emphasis in pilot testing from October to December.</p>
Full article ">Figure 4
<p>Average playing time during the same period.</p>
Full article ">Figure 5
<p>Players with more than 1 min of playing time during the same period.</p>
Full article ">
16 pages, 10945 KiB  
Article
Impact of Video Motion Content on HEVC Coding Efficiency
by Khalid A. M. Salih, Ismail Amin Ali and Ramadhan J. Mstafa
Computers 2024, 13(8), 204; https://doi.org/10.3390/computers13080204 - 18 Aug 2024
Viewed by 871
Abstract
Digital video coding aims to reduce the bitrate and keep the integrity of visual presentation. High-Efficiency Video Coding (HEVC) can effectively compress video content to be suitable for delivery over various networks and platforms. Finding the optimal coding configuration is challenging as the [...] Read more.
Digital video coding aims to reduce the bitrate and keep the integrity of visual presentation. High-Efficiency Video Coding (HEVC) can effectively compress video content to be suitable for delivery over various networks and platforms. Finding the optimal coding configuration is challenging as the compression performance highly depends on the complexity of the encoded video sequence. This paper evaluates the effects of motion content on coding performance and suggests an adaptive encoding scheme based on the motion content of encoded video. To evaluate the effects of motion content on the compression performance of HEVC, we tested three coding configurations with different Group of Pictures (GOP) structures and intra refresh mechanisms. Namely, open GOP IPPP, open GOP Periodic-I, and closed GOP periodic-IDR coding structures were tested using several test sequences with a range of resolutions and motion activity. All sequences were first tested to check their motion activity. The rate–distortion curves were produced for all the test sequences and coding configurations. Our results show that the performance of IPPP coding configuration is significantly better (up to 4 dB) than periodic-I and periodic-IDR configurations for sequences with low motion activity. For test sequences with intermediate motion activity, IPPP configuration can still achieve a reasonable quality improvement over periodic-I and periodic-IDR configurations. However, for test sequences with high motion activity, IPPP configuration has a very small performance advantage over periodic-I and periodic-IDR configurations. Our results indicate the importance of selecting the appropriate coding structure according to the motion activity of the video being encoded. Full article
Show Figures

Figure 1

Figure 1
<p>HEVC video coding encoder [<a href="#B23-computers-13-00204" class="html-bibr">23</a>].</p>
Full article ">Figure 2
<p>HEVC coding units.</p>
Full article ">Figure 3
<p>HEVC coding blocks.</p>
Full article ">Figure 4
<p>Proposed framework.</p>
Full article ">Figure 5
<p>Snapshots of test sequences used [<a href="#B38-computers-13-00204" class="html-bibr">38</a>,<a href="#B39-computers-13-00204" class="html-bibr">39</a>].</p>
Full article ">Figure 6
<p>Configurations tested.</p>
Full article ">Figure 7
<p>Average MVpp of tested video sequences.</p>
Full article ">Figure 8
<p>Frame 90 of <span class="html-italic">Crowd_run</span>, showing motion vectors as white lines.</p>
Full article ">Figure 9
<p>Frame 90 of <span class="html-italic">HoneyBee</span>, showing motion vectors as short red lines.</p>
Full article ">Figure 10
<p>Rate–distortion curve for <span class="html-italic">HoneyBee</span> test sequence.</p>
Full article ">Figure 11
<p>Rate–distortion curve for <span class="html-italic">Sunflower</span> test sequence.</p>
Full article ">Figure 12
<p>Rate–distortion curve for <span class="html-italic">FourPeople</span> test sequence.</p>
Full article ">Figure 13
<p>Rate–distortion curve for <span class="html-italic">Mobcal</span> test sequence.</p>
Full article ">Figure 14
<p>Rate–distortion curve for <span class="html-italic">Shields</span> test sequence.</p>
Full article ">Figure 15
<p>Rate–distortion curve for <span class="html-italic">YachtRide</span> test sequence.</p>
Full article ">Figure 16
<p>Rate–distortion curve for <span class="html-italic">Ducks_take_off</span> test sequence.</p>
Full article ">Figure 17
<p>Rate–distortion curve for <span class="html-italic">Crowd_run</span> test sequence.</p>
Full article ">Figure 18
<p>Encoding time.</p>
Full article ">Figure 19
<p>Decoding time.</p>
Full article ">
14 pages, 1107 KiB  
Article
Semantic-Aware Adaptive Binary Search for Hard-Label Black-Box Attack
by Yiqing Ma, Kyle Lucke, Min Xian and Aleksandar Vakanski
Computers 2024, 13(8), 203; https://doi.org/10.3390/computers13080203 - 18 Aug 2024
Viewed by 858
Abstract
Despite the widely reported potential of deep neural networks for automated breast tumor classification and detection, these models are vulnerable to adversarial attacks, which leads to significant performance degradation on different datasets. In this paper, we introduce a novel adversarial attack approach under [...] Read more.
Despite the widely reported potential of deep neural networks for automated breast tumor classification and detection, these models are vulnerable to adversarial attacks, which leads to significant performance degradation on different datasets. In this paper, we introduce a novel adversarial attack approach under the decision-based black-box setting, where the attack does not have access to the model parameters, and the returned information from querying the target model consists of only the final class label prediction (i.e., hard-label attack). The proposed attack approach has two major components: adaptive binary search and semantic-aware search. The adaptive binary search utilizes a coarse-to-fine strategy that applies adaptive tolerance values in different searching stages to reduce unnecessary queries. The proposed semantic mask-aware search crops the search space by using breast anatomy, which significantly avoids invalid searches. We validate the proposed approach using a dataset of 3378 breast ultrasound images and compare it with another state-of-the-art method by attacking five deep learning models. The results demonstrate that the proposed approach generates imperceptible adversarial samples at a high success rate (between 99.52% and 100%), and dramatically reduces the average and median queries by 23.96% and 31.79%, respectively, compared with the state-of-the-art approach. Full article
(This article belongs to the Special Issue Feature Papers in Computers 2024)
Show Figures

Figure 1

Figure 1
<p>Adversarial images generated using RayS and our method. Q: number of queries, PNSR: peak signal-to-noise ratio.</p>
Full article ">Figure 2
<p>Adaptive tolerance range in Algorithm 1. <math display="inline"><semantics> <msub> <mi>x</mi> <mn>0</mn> </msub> </semantics></math> is clean image. <math display="inline"><semantics> <msup> <mi>x</mi> <mo>′</mo> </msup> </semantics></math> and <math display="inline"><semantics> <msup> <mi>x</mi> <mrow> <mo>″</mo> </mrow> </msup> </semantics></math> are two adversarial samples. The tolerance <math display="inline"><semantics> <mi>τ</mi> </semantics></math> changes adaptively along different search directions.</p>
Full article ">Figure 3
<p>BUS images (<b>left column</b>) and their respective semantic masks for the mammary and tumor regions (<b>right column</b>).</p>
Full article ">Figure 4
<p>Block splitting in semantic-aware search.</p>
Full article ">
17 pages, 1241 KiB  
Article
Time Series Forecasting via Derivative Spike Encoding and Bespoke Loss Functions for Spiking Neural Networks
by Davide Liberato Manna, Alex Vicente-Sola, Paul Kirkland, Trevor Joseph Bihl and Gaetano Di Caterina
Computers 2024, 13(8), 202; https://doi.org/10.3390/computers13080202 - 15 Aug 2024
Viewed by 897
Abstract
The potential of neuromorphic (NM) solutions often lies in their low-SWaP (Size, Weight, and Power) capabilities, which often drive their application to domains that could benefit from this. Nevertheless, spiking neural networks (SNNs), with their inherent time-based nature, present an attractive alternative also [...] Read more.
The potential of neuromorphic (NM) solutions often lies in their low-SWaP (Size, Weight, and Power) capabilities, which often drive their application to domains that could benefit from this. Nevertheless, spiking neural networks (SNNs), with their inherent time-based nature, present an attractive alternative also for areas where data features are present in the time dimension, such as time series forecasting. Time series data, characterized by seasonality and trends, can benefit from the unique processing capabilities of SNNs, which offer a novel approach for this type of task. Additionally, time series data can serve as a benchmark for evaluating SNN performance, providing a valuable alternative to traditional datasets. However, the challenge lies in the real-valued nature of time series data, which is not inherently suited for SNN processing. In this work, we propose a novel spike-encoding mechanism and two loss functions to address this challenge. Our encoding system, inspired by NM event-based sensors, converts the derivative of a signal into spikes, enhancing interoperability with the NM technology and also making the data suitable for SNN processing. Our loss functions then optimize the learning of subsequent spikes by the SNN. We train a simple SNN using SLAYER as a learning rule and conduct experiments using two electricity load forecasting datasets. Our results demonstrate that SNNs can effectively learn from encoded data, and our proposed DecodingLoss function consistently outperforms SLAYER’s SpikeTime loss function. This underscores the potential of SNNs for time series forecasting and sets the stage for further research in this promising area of research. Full article
(This article belongs to the Special Issue Uncertainty-Aware Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Excerpt from the Panama dataset. The blue and orange lines are the signal and the lag-1 version of the signal, respectively. The green line is the difference signal.</p>
Full article ">Figure 2
<p>Schematics of the encoding paradigm. The input is concurrently parsed by all the encoding neurons, which fire spikes (right-hand side of the image) upon seeing a certain change. Inhibitory lateral connections in the populations ensure that if a change triggers neurons with higher thresholds, the other ones are prevented from spiking. The numbers in the encoding neurons represent the threshold multipliers relative to each neuron, rather than the threshold itself. If the base threshold were 0.5, they would have thresholds 1.5, 1, 0.5, −0.5, −1 and −1.5.</p>
Full article ">Figure 3
<p>Bar chart of the value changes in the Panama dataset. Each bar represents the number of times that change in value is found in the data from time t to time t + 1 (i.e., <math display="inline"><semantics> <mrow> <mo>Δ</mo> <mi>x</mi> <mo>=</mo> <mi>x</mi> <mo>(</mo> <mi>t</mi> <mo>+</mo> <mn>1</mn> <mo>)</mo> <mo>−</mo> <mi>x</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>). Note that several of the changes are zero or close to zero, hence potentially not requiring any information propagation depending on the choice of thresholds in the encoding layer.</p>
Full article ">Figure 4
<p>Extract from the Panama data after differencing versus its reconstructed version.</p>
Full article ">Figure 5
<p>Example of a sinusoidal input signal with its derivative and spike-encoding. The sin (blue) and cos derivative (light green) have been scaled to match the height of the plot. Vertical colored lines represent spikes from different neurons (not reported in the legend for readability), where each line indicates the base threshold multiplier (1x, 2x, 3x, 4x, −1x, −2x, −3x, −4x). Note the concurrent presence of high-grade spikes (upper and lower rows) with higher values in the cosine and the presence of lower-grade spikes when the derivative approaches zero. Time step t is a dimensionless discrete variable that represents successive sampled points.</p>
Full article ">Figure 6
<p>Actual (target) spikes (<b>a</b>) vs. predicted spikes (<b>b</b>). In the legend, B&lt;N&gt;&lt;+ or −&gt; denote the significance of the spike bursts of each neuron. Each row on the y-axis represents the output of a different neuron in the encoding layer. As the number increases, the spike represents larger multiples of the initial threshold set in the encoding. The sign denotes whether the represented change is positive or negative.</p>
Full article ">Figure 7
<p>Decoded predicted signal with targets overlaid. Note the resemblance between the two (aside from a few mistakes) and the correct prediction of periodicity.</p>
Full article ">Figure 8
<p>Boxplot comparison of MSE on the Panama dataset for every loss function, grouped by segment length and number of encoding neurons (4 neurons in (<b>a</b>), 8 in (<b>b</b>), 12 in (<b>c</b>), 16 in (<b>d</b>)). Note how the DL (DecodingLoss) and the SpikeTime loss both seem to achieve lower levels of MSE, but the DL does so more steadily across different runs (with the exception of the 4-neurons encoding in (<b>a</b>)).</p>
Full article ">Figure 8 Cont.
<p>Boxplot comparison of MSE on the Panama dataset for every loss function, grouped by segment length and number of encoding neurons (4 neurons in (<b>a</b>), 8 in (<b>b</b>), 12 in (<b>c</b>), 16 in (<b>d</b>)). Note how the DL (DecodingLoss) and the SpikeTime loss both seem to achieve lower levels of MSE, but the DL does so more steadily across different runs (with the exception of the 4-neurons encoding in (<b>a</b>)).</p>
Full article ">Figure 9
<p>Boxplot comparison of MSE on the ETTh1 dataset for every loss function, grouped by segment length and number of encoding neurons (4 neurons in (<b>a</b>), 8 in (<b>b</b>), 12 in (<b>c</b>), 16 in (<b>d</b>)). Despite some differences in the spread, the trend is similar to the Panama dataset with the DecodingLoss reaching smaller minima, thus highlighting a consistent.</p>
Full article ">Figure 10
<p>Reconstruction mean squared error (MSE) using different loss functions and the number of encoding neurons on the Panama dataset. The solid lines represent the median, whereas the shaded areas represent the interquartile range.</p>
Full article ">Figure 11
<p>Reconstruction mean squared error (MSE) using different loss functions and the number of encoding neurons on the ETTh1 dataset. The solid lines represent the median, whereas the shaded areas represent the interquartile range. Note the increase in the overall spread as the number of neurons increases.</p>
Full article ">
29 pages, 3409 KiB  
Article
Training and Certification of Competences through Serious Games
by Ricardo Baptista, António Coelho and Carlos Vaz de Carvalho
Computers 2024, 13(8), 201; https://doi.org/10.3390/computers13080201 - 15 Aug 2024
Viewed by 985
Abstract
The potential of digital games, when transformed into Serious Games (SGs), Games for Learning (GLs), or game-based learning (GBL), is truly inspiring. These forms of games hold immense potential as effective learning tools as they have a unique ability to provide challenges that [...] Read more.
The potential of digital games, when transformed into Serious Games (SGs), Games for Learning (GLs), or game-based learning (GBL), is truly inspiring. These forms of games hold immense potential as effective learning tools as they have a unique ability to provide challenges that align with learning objectives and adapt to the learner’s level. This adaptability empowers educators to create a flexible and customizable learning experience, crucial in acquiring knowledge, experience, and professional skills. However, the lack of a standardised design methodology for challenges that promote skill acquisition often hampers the effectiveness of games-based training. The four-step Triadic Certification Method directly responds to this challenge, although implementing it may require significant resources and expertise and adapting it to different training contexts may be challenging. This method, built on a triadic of components: competencies, mechanics, and training levels, offers a new approach for game designers to create games with embedded in-game assessment towards the certification of competencies. The model combines the competencies defined for each training plan with the challenges designed for the game on a matrix that aligns needs and levels, ensuring a comprehensive and practical learning experience. The practicality of the model is evident in its ability to balance the various components of a certification process. To validate this method, a case study was developed in the context of learning how to drive, supported by a game coupled with a realistic driving simulator. The real time collection of game and training data and its processing, based on predefined settings, learning metrics (performance) and game elements (mechanics and parameterisations), defined by both experts and game designers, makes it possible to visualise the progression of learning and to give visual and auditory feedback to the student on their behaviour. The results demonstrate that it is possible use the data generated by the player and his/her interaction with the game to certify the competencies acquired. Full article
(This article belongs to the Special Issue Game-Based Learning, Gamification in Education and Serious Games 2023)
Show Figures

Figure 1

Figure 1
<p>Workflow of Triadic Certification with used tools and defined goals.</p>
Full article ">Figure 2
<p>Certification Triadic Model for training local tour guides.</p>
Full article ">Figure 3
<p>Picture of the simulation room and the driving position.</p>
Full article ">Figure 4
<p>Table of interconnection between routes and competences, where each competence has a colour and corresponding training and assessment context.</p>
Full article ">Figure 5
<p>Summary grid highlighting the competencies identified for the training scenario.</p>
Full article ">Figure 6
<p>Mapping of the training (paths) with the level of competence acquired through the mechanics identified by the game taxonomy.</p>
Full article ">
12 pages, 1968 KiB  
Article
A Deep Learning Approach for Early Detection of Facial Palsy in Video Using Convolutional Neural Networks: A Computational Study
by Anuja Arora, Jasir Mohammad Zaeem, Vibhor Garg, Ambikesh Jayal and Zahid Akhtar
Computers 2024, 13(8), 200; https://doi.org/10.3390/computers13080200 - 15 Aug 2024
Viewed by 855
Abstract
Facial palsy causes the face to droop due to sudden weakness in the muscles on one side of the face. Computer-added assistance systems for the automatic recognition of palsy faces present a promising solution to recognizing the paralysis of faces at an early [...] Read more.
Facial palsy causes the face to droop due to sudden weakness in the muscles on one side of the face. Computer-added assistance systems for the automatic recognition of palsy faces present a promising solution to recognizing the paralysis of faces at an early stage. A few research studies have already been performed to handle this research issue using an automatic deep feature extraction by deep learning approach and handcrafted machine learning approach. This empirical research work designed a multi-model facial palsy framework which is a combination of two convolutional models—a multi-task cascaded convolutional network (MTCNN) for face and landmark detection and a hyperparameter tuned and parametric setting convolution neural network model for facial palsy classification. Using the proposed multi-model facial palsy framework, we presented results on a dataset of YouTube videos featuring patients with palsy. The results indicate that the proposed framework can detect facial palsy efficiently. Furthermore, the achieved accuracy, precision, recall, and F1-score values of the proposed framework for facial palsy detection are 97%, 94%, 90%, and 97%, respectively, for the training dataset. For the validation dataset, the accuracy achieved is 95%, precision is 90%, recall is 75.6%, and F-score is 76%. As a result, this framework can easily be used for facial palsy detection. Full article
Show Figures

Figure 1

Figure 1
<p>MTCNN architecture [adapted from [<a href="#B19-computers-13-00200" class="html-bibr">19</a>], original MTCNN research paper].</p>
Full article ">Figure 2
<p>Convolution model for facial palsy detection, the output activation maps of each layer are labeled (figure of proposed CNN model is designed using NN-SVG).</p>
Full article ">Figure 3
<p>Training and validation dataset partition.</p>
Full article ">Figure 4
<p>The MTCNN results for face and landmark detection, face enhancement (<a href="https://www.thestar.com.my/lifestyle/entertainment/2021/09/17/model-jung-ho-yeon-goes-from-ny-fashion-week-to-making-her-acting-debut-in-new-series-squid-game" target="_blank">https://www.thestar.com.my/lifestyle/entertainment/2021/09/17/model-jung-ho-yeon-goes-from-ny-fashion-week-to-making-her-acting-debut-in-new-series-squid-game</a>, accessed on 1 December 2021). (<b>a</b>) Face and Landmark detection. (<b>b</b>) Calculate eye angle. (<b>c</b>) Measure angle to rotate image. (<b>d</b>) rotated image. (<b>e</b>) Extract Image.</p>
Full article ">Figure 5
<p>Facial palsy affected and not affected classification outcome (<a href="https://www.youtube.com/watch?v=1weQBIGTACo" target="_blank">https://www.youtube.com/watch?v=1weQBIGTACo</a> (accessed on 1 December 2021) [permission graded by YouTube Video Owner]).</p>
Full article ">Figure 6
<p>Confusion matrix of the chosen model on the training set.</p>
Full article ">Figure 7
<p>Training and validation accuracy plot of Palsy detection using proposed approach.</p>
Full article ">Figure 8
<p>Training and validation precision plot of Palsy detection using proposed approach.</p>
Full article ">Figure 9
<p>Training and validation recall plot of Palsy detection using proposed approach.</p>
Full article ">Figure 10
<p>Training and validation F-score plot of Palsy detection using proposed approach.</p>
Full article ">Figure 11
<p>Test cases of validation dataset facial palsy-affected/unaffected classification. (<b>a</b>) Affected, Test Case: Pass. (<b>b</b>) Affected, Test Case: Fail.</p>
Full article ">
18 pages, 10704 KiB  
Article
Virtual Reality Integration for Enhanced Engineering Education and Experimentation: A Focus on Active Thermography
by Ilario Strazzeri, Arnaud Notebaert, Camila Barros, Julien Quinten and Anthonin Demarbaix
Computers 2024, 13(8), 199; https://doi.org/10.3390/computers13080199 - 15 Aug 2024
Viewed by 864
Abstract
The interconnection between engineering simulations, real-world experiments, and virtual reality remains underutilised in engineering. This study addresses this gap by implementing such interconnections, focusing on active thermography for a carbon fibre plate in the aerospace domain. Six scenarios based on three parameters were [...] Read more.
The interconnection between engineering simulations, real-world experiments, and virtual reality remains underutilised in engineering. This study addresses this gap by implementing such interconnections, focusing on active thermography for a carbon fibre plate in the aerospace domain. Six scenarios based on three parameters were simulated using ComSol Multiphysics 6.2 and validated experimentally. The results were then integrated into a virtual reality serious game developed with Unreal Engine 5.3.2 and aimed at educating users on thermography principles and aiding rapid experimental condition analysis. Users are immersed in a 3D representation of the research laboratory, allowing interaction with the environment, understanding thermographic setups, accessing instructional videos, and analysing results as graphs or animations. This serious game helps users determine the optimal scenario for a given problem, enhance thermography principle comprehension, and achieve results more swiftly than through real-world experimentation. This innovative approach bridges the gap between simulations and practical experiments, providing a more engaging and efficient learning experience in engineering education. It highlights the potential of integrating simulations, experiments, and virtual reality to improve understanding and efficiency in engineering. Full article
Show Figures

Figure 1

Figure 1
<p>Relation diagram of the project.</p>
Full article ">Figure 2
<p>Thermography setup.</p>
Full article ">Figure 3
<p>Benchmark plan taking into account the delaminated areas produced using a 3D printer.</p>
Full article ">Figure 4
<p>Example of Thermograms.</p>
Full article ">Figure 5
<p>Example of contrast curves.</p>
Full article ">Figure 6
<p>Menu of the serious game in Unreal Engine 5.3.2.</p>
Full article ">Figure 7
<p>Comparison between the real laboratory and the virtual in Unreal Engine 5.3.2.</p>
Full article ">Figure 7 Cont.
<p>Comparison between the real laboratory and the virtual in Unreal Engine 5.3.2.</p>
Full article ">Figure 8
<p>Analysis room of the serious game in Unreal Engine 5.3.2.</p>
Full article ">Figure 9
<p>Diagram of how the cursor works on the interface.</p>
Full article ">Figure 10
<p>Menu selection in VR.</p>
Full article ">Figure 11
<p>Video of thermographic principle in the Laboratory in VR.</p>
Full article ">Figure 12
<p>Example of graphic in the analysis room in VR.</p>
Full article ">Figure 13
<p>Example of thermogram in the analysis room in VR.</p>
Full article ">Figure 14
<p>Navigation diagram of the serious game.</p>
Full article ">Figure 15
<p>User playing the serious game during virtual evaluation.</p>
Full article ">Figure 16
<p>Result graph of the survey: (<b>a</b>) qualitative part; (<b>b</b>) quantitative part.</p>
Full article ">Figure 16 Cont.
<p>Result graph of the survey: (<b>a</b>) qualitative part; (<b>b</b>) quantitative part.</p>
Full article ">
27 pages, 5663 KiB  
Article
A Platform for Integrating Internet of Things, Machine Learning, and Big Data Practicum in Electrical Engineering Curricula
by Nandana Jayachandran, Atef Abdrabou, Naod Yamane and Anwer Al-Dulaimi
Computers 2024, 13(8), 198; https://doi.org/10.3390/computers13080198 - 15 Aug 2024
Viewed by 1116
Abstract
The integration of the Internet of Things (IoT), big data, and machine learning (ML) has pioneered a transformation across several fields. Equipping electrical engineering students to remain abreast of the dynamic technological landscape is vital. This underscores the necessity for an educational tool [...] Read more.
The integration of the Internet of Things (IoT), big data, and machine learning (ML) has pioneered a transformation across several fields. Equipping electrical engineering students to remain abreast of the dynamic technological landscape is vital. This underscores the necessity for an educational tool that can be integrated into electrical engineering curricula to offer a practical way of learning the concepts and the integration of IoT, big data, and ML. Thus, this paper offers the IoT-Edu-ML-Stream open-source platform, a graphical user interface (GUI)-based emulation software tool to help electrical engineering students design and emulate IoT-based use cases with big data analytics. The tool supports the emulation or the actual connectivity of a large number of IoT devices. The emulated devices can generate realistic correlated IoT data and stream it via the message queuing telemetry transport (MQTT) protocol to a big data platform. The tool allows students to design ML models with different algorithms for their chosen use cases and train them for decision-making based on the streamed data. Moreover, the paper proposes learning outcomes to be targeted when integrating the tool into an electrical engineering curriculum. The tool is evaluated using a comprehensive survey. The survey results show that the students gained significant knowledge about IoT concepts after using the tool, even though many of them already had prior knowledge of IoT. The results also indicate that the tool noticeably improved the students’ practical skills in designing real-world use cases and helped them understand fundamental machine learning analytics with an intuitive user interface. Full article
(This article belongs to the Special Issue Smart Learning Environments)
Show Figures

Figure 1

Figure 1
<p>MQTT connection establishment.</p>
Full article ">Figure 2
<p>Integration of IoT, big data platform, and ML.</p>
Full article ">Figure 3
<p>IoT-Edu-ML-Stream features.</p>
Full article ">Figure 4
<p>Design approach.</p>
Full article ">Figure 5
<p>IoT-Edu-ML-Stream flowchart.</p>
Full article ">Figure 6
<p>Screen to select data generation method.</p>
Full article ">Figure 7
<p>Screen to create IoT network.</p>
Full article ">Figure 8
<p>Screen for IoT network configuration.</p>
Full article ">Figure 9
<p>Screen showing network configuration summary.</p>
Full article ">Figure 10
<p>Screen to create big data topics.</p>
Full article ">Figure 11
<p>Screen for choosing ML input data.</p>
Full article ">Figure 12
<p>Option to save the dataset in CSV format.</p>
Full article ">Figure 13
<p>Screen to choose ML algorithm.</p>
Full article ">Figure 14
<p>Configuration of the parameters.</p>
Full article ">Figure 15
<p>Model metrics and options.</p>
Full article ">Figure 16
<p>Block diagram outlining the required hardware and software setup for the case study.</p>
Full article ">Figure 17
<p>Q1 survey response.</p>
Full article ">Figure 18
<p>Q2 survey response.</p>
Full article ">Figure 19
<p>Q3 survey response.</p>
Full article ">Figure 20
<p>Q4 survey response.</p>
Full article ">Figure 21
<p>Q5 survey response.</p>
Full article ">Figure 22
<p>Q6 survey response.</p>
Full article ">
31 pages, 2279 KiB  
Article
Achieving High Accuracy in Android Malware Detection through Genetic Programming Symbolic Classifier
by Nikola Anđelić and Sandi Baressi Šegota
Computers 2024, 13(8), 197; https://doi.org/10.3390/computers13080197 - 15 Aug 2024
Viewed by 835
Abstract
The detection of Android malware is of paramount importance for safeguarding users’ personal and financial data from theft and misuse. It plays a critical role in ensuring the security and privacy of sensitive information on mobile devices, thereby preventing unauthorized access and potential [...] Read more.
The detection of Android malware is of paramount importance for safeguarding users’ personal and financial data from theft and misuse. It plays a critical role in ensuring the security and privacy of sensitive information on mobile devices, thereby preventing unauthorized access and potential damage. Moreover, effective malware detection is essential for maintaining device performance and reliability by mitigating the risks posed by malicious software. This paper introduces a novel approach to Android malware detection, leveraging a publicly available dataset in conjunction with a Genetic Programming Symbolic Classifier (GPSC). The primary objective is to generate symbolic expressions (SEs) that can accurately identify malware with high precision. To address the challenge of imbalanced class distribution within the dataset, various oversampling techniques are employed. Optimal hyperparameter configurations for GPSC are determined through a random hyperparameter values search (RHVS) method developed in this research. The GPSC model is trained using a 10-fold cross-validation (10FCV) technique, producing a set of 10 SEs for each dataset variation. Subsequently, the most effective SEs are integrated into a threshold-based voting ensemble (TBVE) system, which is then evaluated on the original dataset. The proposed methodology achieves a maximum accuracy of 0.956, thereby demonstrating its effectiveness for Android malware detection. Full article
Show Figures

Figure 1

Figure 1
<p>The graphical representation of the research methodology.</p>
Full article ">Figure 2
<p>The results of the Pearson’s correlation analysis between the input variables and the output (target) variable are displayed. The plot highlights only those input variables that exhibit a correlation value greater than 0.3 or less than −0.3 with the target variable.</p>
Full article ">Figure 3
<p>The initial imbalance between class samples.</p>
Full article ">Figure 4
<p>The balance between class samples achieved using different oversampling techniques.</p>
Full article ">Figure 5
<p>The tree structure of the population member in GP.</p>
Full article ">Figure 6
<p>The graphical representation of the train/test procedure used in this research.</p>
Full article ">Figure 7
<p>Classification performance of the best sets of SEs obtained from balanced dataset variations.</p>
Full article ">Figure 8
<p>The confusion matrix for the best SEs obtained from KMeansSMOTE dataset.</p>
Full article ">Figure 9
<p>Classification performance of TBVE consisting of 50 SEs versus threshold value. The red dotted lines represents the interval with high classification performance while blue line represents the highest classification performance achieved.</p>
Full article ">Figure 10
<p>The confusion matrix of TBVE for a threshold value of 28.</p>
Full article ">
23 pages, 671 KiB  
Review
Usage of Gamification Techniques in Software Engineering Education and Training: A Systematic Review
by Vincenzo Di Nardo, Riccardo Fino, Marco Fiore, Giovanni Mignogna, Marina Mongiello and Gaetano Simeone
Computers 2024, 13(8), 196; https://doi.org/10.3390/computers13080196 - 14 Aug 2024
Viewed by 2336
Abstract
Gamification, the integration of game design elements into non-game contexts, has gained prominence in the software engineering education and training realm. By incorporating elements such as points, badges, quests, and challenges, gamification aims to motivate and engage learners, potentially transforming traditional educational methods. [...] Read more.
Gamification, the integration of game design elements into non-game contexts, has gained prominence in the software engineering education and training realm. By incorporating elements such as points, badges, quests, and challenges, gamification aims to motivate and engage learners, potentially transforming traditional educational methods. This paper addresses the gap in systematic evaluations of gamification’s effectiveness in software engineering education and training by conducting a comprehensive literature review of 68 primary studies. This review explores the advantages of gamification, including active learning, individualized pacing, and enhanced collaboration, as well as the psychological drawbacks such as increased stress and responsibility for students. Despite the promising results, this study highlights that gamification should be considered a supplementary tool rather than a replacement for traditional teaching methods. Our findings reveal significant interest in integrating gamification in educational settings, driven by the growing need for digital content to improve learning. Full article
(This article belongs to the Special Issue Game-Based Learning, Gamification in Education and Serious Games 2023)
Show Figures

Figure 1

Figure 1
<p>PRISMA search methodology.</p>
Full article ">Figure 2
<p>A common architecture for gamified educational platforms.</p>
Full article ">Figure 3
<p>Publication trends over time for gamification in SEET.</p>
Full article ">Figure 4
<p>Distribution of publication types for gamification in SEET.</p>
Full article ">Figure 5
<p>Sectors of application for gamification in SEET.</p>
Full article ">Figure 6
<p>Distribution by search type.</p>
Full article ">Figure 7
<p>Application areas of gamification in SEET.</p>
Full article ">Figure 8
<p>Geographical distribution of studies on gamification in SEET.</p>
Full article ">
12 pages, 3959 KiB  
Article
An Efficient QC-LDPC Decoder Architecture for 5G-NR Wireless Communication Standards Targeting FPGA
by Bilal Mejmaa, Malika Alami Marktani, Ismail Akharraz and Abdelaziz Ahaitouf
Computers 2024, 13(8), 195; https://doi.org/10.3390/computers13080195 - 14 Aug 2024
Cited by 2 | Viewed by 1472
Abstract
This novel research introduces a game-changing architecture design for Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) decoders in Fifth-Generation New-Radio (5G-NR) wireless communications, specifically designed to meet precise specifications and leveraging the layered Min-Sum (MS) algorithm. Our innovative approach presents a fully parallel architecture that is [...] Read more.
This novel research introduces a game-changing architecture design for Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) decoders in Fifth-Generation New-Radio (5G-NR) wireless communications, specifically designed to meet precise specifications and leveraging the layered Min-Sum (MS) algorithm. Our innovative approach presents a fully parallel architecture that is precisely engineered to cater to the demanding high-throughput requirements of enhanced Mobile Broadband (eMBB) applications. To ensure smooth computation in the MS algorithm, we use the Sub-Optimal Low-Latency (SOLL) technique to optimize the critical check node process. Thus, our design has the potential to greatly benefit certain Ultra-Reliable Low-Latency Communications (URLLC) scenarios. We conducted precise Bit Error Rate (BER) performance analysis on our LDPC decoder using a Hardware Description Language (HDL) Co-Simulation (MATLAB/Simulink/ModelSim) for two codeword rates (2/3 and 1/3), simulating the challenging Additive White Gaussian Noise (AWGN) channel environment. Full article
Show Figures

Figure 1

Figure 1
<p>5G-NR data transmission blocks.</p>
Full article ">Figure 2
<p>Structure of 5G NR base graphs; −1 entries are represented as blank, and “Hp(i,j) ≥ 0” are represented as dots.</p>
Full article ">Figure 3
<p>Structure of both base graphs according to the rate (R) and the number of message bits (K).</p>
Full article ">Figure 4
<p>Global architecture of the proposed decoder. Data flow is color-coded for clarity: bold black for the main data path, blue for raw data, pink for processed data, orange for layer controls (shifting data), and violet for the processed data memory.</p>
Full article ">Figure 5
<p>Check node unit structure and its modeling on Simulink.</p>
Full article ">Figure 6
<p>Simulink redesign of the SOLL unit for 5G-NR usage.</p>
Full article ">Figure 7
<p>Comparison of the proposed decoder’s SNR performance with other designs, (<b>a</b>) [<a href="#B11-computers-13-00195" class="html-bibr">11</a>] based on the rate 1/3 and (<b>b</b>) (AMS [<a href="#B12-computers-13-00195" class="html-bibr">12</a>], MS [<a href="#B14-computers-13-00195" class="html-bibr">14</a>]) based on the rate 2/3.</p>
Full article ">
17 pages, 4387 KiB  
Article
Adaptive Load Balancing Approach to Mitigate Network Congestion in VANETS
by Syed Ehsan Haider, Muhammad Faizan Khan and Yousaf Saeed
Computers 2024, 13(8), 194; https://doi.org/10.3390/computers13080194 - 13 Aug 2024
Viewed by 845
Abstract
Load balancing to alleviate network congestion remains a critical challenge in Vehicular Ad Hoc Networks (VANETs). During route and response scheduling, road side units (RSUs) risk being overloaded beyond their calculated capacity. Despite recent advancements like RSU-based load transfer, NP-Hard hierarchical geography routing, [...] Read more.
Load balancing to alleviate network congestion remains a critical challenge in Vehicular Ad Hoc Networks (VANETs). During route and response scheduling, road side units (RSUs) risk being overloaded beyond their calculated capacity. Despite recent advancements like RSU-based load transfer, NP-Hard hierarchical geography routing, RSU-based medium access control (MAC) schemes, simplified clustering, and network activity control, a significant gap persists in employing a load-balancing server for effective traffic management. We propose a server-based network congestion handling mechanism (SBNC) in VANETs to bridge this gap. Our approach clusters RSUs within specified ranges and incorporates dedicated load balancing and network scheduler RSUs to manage route selection and request–response scheduling, thereby balancing RSU loads. We introduce three key algorithms: optimal placement of dedicated RSUs, a scheduling policy for packets/data/requests/responses, and a congestion control algorithm for load balancing. Using the VanetMobiSim library of Network Simulator-2 (NS-2), we evaluate our approach based on residual energy consumption, end-to-end delay, packet delivery ratio (PDR), and control packet overhead. Results indicate substantial improvements in load balancing through our proposed server-based approach. Full article
Show Figures

Figure 1

Figure 1
<p>VANET Structure [<a href="#B1-computers-13-00194" class="html-bibr">1</a>].</p>
Full article ">Figure 2
<p>Proposed Load Balancing Architecture.</p>
Full article ">Figure 3
<p>System Flow Diagram.</p>
Full article ">Figure 4
<p>Residual of Energy Consumption of the Proposed Technique compared with existing approaches.</p>
Full article ">Figure 5
<p>End-to-End Delay in the Network compared with the proposed approach.</p>
Full article ">Figure 6
<p>Packet Delivery Ration (PDR) for proposed load balancing technique in Urban Area VANET.</p>
Full article ">Figure 7
<p>Control Packet Overhead in Urban Vehicular Area Network to control the traffic congestion and load balancing.</p>
Full article ">
25 pages, 3068 KiB  
Article
Metaverse Unveiled: From the Lens of Science to Common People Perspective
by Mónica Cruz, Abílio Oliveira and Alessandro Pinheiro
Computers 2024, 13(8), 193; https://doi.org/10.3390/computers13080193 - 13 Aug 2024
Viewed by 1038
Abstract
Everyone forms a perception about everything, including the Metaverse. Still, we may expect a gap or disconnection between what has been expressed by various researchers and the widespread perceptions of technology and related concepts. However, the degree to which these two frames of [...] Read more.
Everyone forms a perception about everything, including the Metaverse. Still, we may expect a gap or disconnection between what has been expressed by various researchers and the widespread perceptions of technology and related concepts. However, the degree to which these two frames of representation differ awaits further investigation. This study seeks to compare the Metaverse perceptions between the scientific findings and the common people’s perceptions using the data from two previous qualitative studies about the representations of the Metaverse from a scientific perspective versus a common perspective (by adults). Is there a common ground between these two perspectives? Or are they in opposition? As goals for this research, we aim to contrast the depiction of the Metaverse in pertinent studies (published in indexed journals) with the portrayal of the Metaverse among adults (non-researchers); ascertain the most prevalent depiction of virtual reality; and determine the significance of gaming within the representations of the Metaverse and virtual reality. This investigation encapsulates crucial findings on the Metaverse concept, contrasting the discoveries made by researchers in prior studies with the common public’s interpretation of this concept. It helps with understanding the differences between the Metaverse representations, the immersion and perception concepts, and a disagreement from the past vs. future perspective. Full article
(This article belongs to the Special Issue Extended or Mixed Reality (AR + VR): Technology and Applications)
Show Figures

Figure 1

Figure 1
<p>PRISMA 2020: the flow diagram for systematic reviews.</p>
Full article ">Figure 2
<p>Comparison Graphic—3 most mentioned concepts/categories.</p>
Full article ">Figure 3
<p>Comparison graphic—social concept/category.</p>
Full article ">Figure 4
<p>Comparison graphic—immersive concept/category.</p>
Full article ">Figure 5
<p>Comparison graphic—virtual concept/category.</p>
Full article ">Figure 6
<p>Comparison graphic—virtual reality concept/category.</p>
Full article ">Figure 7
<p>Comparison graphic—future/past concepts/categories.</p>
Full article ">Figure 8
<p>Voyant comparison word cloud.</p>
Full article ">Figure 9
<p>Voyant tendencies graphic.</p>
Full article ">
13 pages, 385 KiB  
Article
Availability, Scalability, and Security in the Migration from Container-Based to Cloud-Native Applications
by Bruno Nascimento, Rui Santos, João Henriques, Marco V. Bernardo and Filipe Caldeira
Computers 2024, 13(8), 192; https://doi.org/10.3390/computers13080192 - 9 Aug 2024
Viewed by 2384
Abstract
The shift from traditional monolithic architectures to container-based solutions has revolutionized application deployment by enabling consistent, isolated environments across various platforms. However, as organizations look for improved efficiency, resilience, security, and scalability, the limitations of container-based applications, such as their manual scaling, resource [...] Read more.
The shift from traditional monolithic architectures to container-based solutions has revolutionized application deployment by enabling consistent, isolated environments across various platforms. However, as organizations look for improved efficiency, resilience, security, and scalability, the limitations of container-based applications, such as their manual scaling, resource management challenges, potential single points of failure, and operational complexities, become apparent. These challenges, coupled with the need for sophisticated tools and expertise for monitoring and security, drive the move towards cloud-native architectures. Cloud-native approaches offer a more robust integration with cloud services, including managed databases and AI/ML services, providing enhanced agility and efficiency beyond what standalone containers can achieve. Availability, scalability, and security are the cornerstone requirements of these cloud-native applications. This work explores how containerized applications can be customized to address such requirements during their shift to cloud-native orchestrated environments. A Proof of Concept (PoC) demonstrated the technical aspects of such a move into a Kubernetes environment in Azure. The results from its evaluation highlighted the suitability of Kubernetes in addressing such a demand for availability and scalability while safeguarding security when moving containerized applications to cloud-native environments. Full article
Show Figures

Figure 1

Figure 1
<p>Cloud-native application architecture.</p>
Full article ">Figure 2
<p>Network traffic.</p>
Full article ">Figure 3
<p>CPU, memory, and disk consumption.</p>
Full article ">Figure 4
<p>Average and max CPU, memory, and disk usage.</p>
Full article ">Figure 5
<p>Average and summed node statuses.</p>
Full article ">Figure 6
<p>Average and summed cluster health.</p>
Full article ">Figure 7
<p>Number of Pods in different phases.</p>
Full article ">
18 pages, 3533 KiB  
Article
Rice Yield Forecasting Using Hybrid Quantum Deep Learning Model
by De Rosal Ignatius Moses Setiadi, Ajib Susanto, Kristiawan Nugroho, Ahmad Rofiqul Muslikh, Arnold Adimabua Ojugo and Hong-Seng Gan
Computers 2024, 13(8), 191; https://doi.org/10.3390/computers13080191 - 7 Aug 2024
Cited by 1 | Viewed by 1958
Abstract
In recent advancements in agricultural technology, quantum mechanics and deep learning integration have shown promising potential to revolutionize rice yield forecasting methods. This research introduces a novel Hybrid Quantum Deep Learning model that leverages the intricate processing capabilities of quantum computing combined with [...] Read more.
In recent advancements in agricultural technology, quantum mechanics and deep learning integration have shown promising potential to revolutionize rice yield forecasting methods. This research introduces a novel Hybrid Quantum Deep Learning model that leverages the intricate processing capabilities of quantum computing combined with the robust pattern recognition prowess of deep learning algorithms such as Extreme Gradient Boosting (XGBoost) and Bidirectional Long Short-Term Memory (Bi-LSTM). Bi-LSTM networks are used for temporal feature extraction and quantum circuits for quantum feature processing. Quantum circuits leverage quantum superposition and entanglement to enhance data representation by capturing intricate feature interactions. These enriched quantum features are combined with the temporal features extracted by Bi-LSTM and fed into an XGBoost regressor. By synthesizing quantum feature processing and classical machine learning techniques, our model aims to improve prediction accuracy significantly. Based on measurements of mean square error (MSE), the coefficient of determination (R2), and mean average error (MAE), the results are 1.191621 × 10−5, 0.999929482, and 0.001392724, respectively. This value is so close to perfect that it helps make essential decisions in global agricultural planning and management. Full article
Show Figures

Figure 1

Figure 1
<p>Plot the relationship of crop yield features with other features. (<b>a</b>) The relationship between crop yield and annual rainfall indicates no clear linear pattern, suggesting a complex or non-linear relationship influenced by other variables. (<b>b</b>) The relationship between crop yield and pesticide use also shows no strong linear pattern, indicating other factors may play a significant role. (<b>c</b>) The relationship between crop yield and average temperature does not show a clear linear relationship, suggesting temperature influences crop yield in a complex manner.</p>
Full article ">Figure 2
<p>Temporal feature analysis plot using a three-year moving average.</p>
Full article ">Figure 3
<p>Heatmap plot feature analysis.</p>
Full article ">Figure 4
<p>Framework of hybrid quantum–classical deep learning model.</p>
Full article ">Figure 5
<p>Quantum circuit design for feature processing.</p>
Full article ">Figure 6
<p>Sample dataset after one-hot encoding.</p>
Full article ">Figure 7
<p>Scatter plot of proposed regression model results.</p>
Full article ">
13 pages, 3310 KiB  
Article
Dynamic Opinion Formation in Networks: A Multi-Issue and Evidence-Based Approach
by Joel Weijia Lai
Computers 2024, 13(8), 190; https://doi.org/10.3390/computers13080190 - 7 Aug 2024
Viewed by 1182
Abstract
In this study, we present a computational model for simulating opinion dynamics within social networks, incorporating cognitive and social psychological principles such as homophily, confirmation bias, and selective exposure. We enhance our model using Dempster–Shafer theory to address uncertainties in belief updating. Mathematical [...] Read more.
In this study, we present a computational model for simulating opinion dynamics within social networks, incorporating cognitive and social psychological principles such as homophily, confirmation bias, and selective exposure. We enhance our model using Dempster–Shafer theory to address uncertainties in belief updating. Mathematical formalism and simulations were performed to derive empirical results from showcasing how this method might be useful for modeling real-world opinion consensus and fragmentation. By constructing a scale-free network, we assign initial opinions and iteratively update them based on neighbor influences and belief masses. Lastly, we examine how the presence of “truth” nodes with high connectivity, used to simulate the influence of objective truth on the network, alters opinions. Our simulations reveal insights into the formation of opinion clusters, the role of cognitive biases, and the impact of uncertainty on belief evolution, providing a robust framework for understanding complex opinion dynamics in social systems. Full article
(This article belongs to the Special Issue Recent Advances in Social Networks and Social Media)
Show Figures

Figure 1

Figure 1
<p>An illustrative example of the results of opinion evolution under Tan and Cheong’s (<b>a</b>) inclusivist interaction, (<b>b</b>) general interaction, and (<b>c</b>) exclusivist interaction in the bounded confidence model.</p>
Full article ">Figure 2
<p>Simulation results of the modified bounded confidence model for the BA network, where agents are under evidence-based (DST) opinion evolution, averaged over 100 experiments. The x-axis is the timestep <span class="html-italic">t</span>, while the y-axis shows the opinions <math display="inline"><semantics> <mrow> <msubsup> <mi>x</mi> <mi>k</mi> <mi>i</mi> </msubsup> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>. The number of issues is <math display="inline"><semantics> <mrow> <mo>|</mo> <mi>K</mi> <mo>|</mo> <mo>=</mo> <mo>{</mo> <mn>2</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>10</mn> <mo>}</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Simulation results of the modified bounded confidence model for the BA network where agents are under influence-based opinion evolution. The x-axis is the timestep <span class="html-italic">t</span>, while the y-axis shows the opinions <math display="inline"><semantics> <mrow> <msubsup> <mi>x</mi> <mi>k</mi> <mi>i</mi> </msubsup> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Simulation results of the evidence-based bounded confidence model with (<b>a</b>) exoteric and (<b>b</b>) privileged truths in the case of (I) weak and (II) strong truths averaged over 100 experiments. The red line denotes the “truth” in the four simulations. In (<b>a</b>) (I), the blue line denotes the node with the highest influence.</p>
Full article ">Figure 5
<p>Simulation results for different numbers of strong exoteric truths in combinations of centrist and extreme truths. The x-axis is the timestep <span class="html-italic">t</span>, while the y-axis shows the evolution of opinions <math display="inline"><semantics> <mrow> <msubsup> <mi>x</mi> <mi>k</mi> <mi>i</mi> </msubsup> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>. The red line denotes the “truth” for the particular issue.</p>
Full article ">
20 pages, 9632 KiB  
Article
Force-Directed Immersive 3D Network Visualization
by Alexander Brezani, Jozef Kostolny and Michal Zabovsky
Computers 2024, 13(8), 189; https://doi.org/10.3390/computers13080189 - 5 Aug 2024
Viewed by 1050
Abstract
Network visualization, in mathematics often referred to as graph visualization, has evolved significantly over time, offering various methods to effectively represent complex data structures. New methods and devices advance the possibilities of visualization both from the point of view of the quality of [...] Read more.
Network visualization, in mathematics often referred to as graph visualization, has evolved significantly over time, offering various methods to effectively represent complex data structures. New methods and devices advance the possibilities of visualization both from the point of view of the quality of displayed information and of the possibilities of visualizing a larger amount of data. Immersive visualization includes the user directly in presented visual representation but requires a native 3D environment for direct interaction with visualized information. This article describes an approach to creating a force-directed immersive 3D network visualization algorithm available for application in immersive environments, such as a cave automatic virtual environment or virtual reality. The algorithm aims to address the challenge of creating visually appealing and easily interpretable visualizations by utilizing 3D space and the Unity engine. The results show successfully visualized data and developed interactive visualization methods, overcoming limitations of basic force-directed implementations. The main contribution of the presented research is the force-directed algorithm with springs and controlled placement as an immersive visualization technique that combines the use of springs and attractive forces to stabilize a network in a 3D environment. Full article
Show Figures

Figure 1

Figure 1
<p>Two-dimensional visualizations of Pokec dataset with different numbers of vertices and edges using Fruchterman–Reingold algorithm. With an increasing number of vertices (from 500 to 5000 with respective edges/links), the occlusion problem arises.</p>
Full article ">Figure 2
<p>Results of naïve implementation using spring joints rendered as the default view with no additional user interaction in 3D: (<b>a</b>) Pokec 500 containing 500 vertices and 3084 edges; (<b>b</b>) Pokec 1000 containing 1000 vertices and 6297 edges; (<b>c</b>) Pokec 2000 containing 2000 vertices and 18,313 edges; (<b>d</b>) Pokec 3000 containing 3000 vertices and 29,177 edges.</p>
Full article ">Figure 3
<p>Results of modified Fruchterman–Reingold algorithm for 3D implementation rendered as the default view with no additional user interaction in 3D: (<b>a</b>) Pokec 500 containing 500 vertices and 3084 edges; (<b>b</b>) Pokec 1000 containing 1000 vertices and 6297 edges; (<b>c</b>) Pokec 2000 containing 2000 vertices and 18,313 edges; (<b>d</b>) Pokec 3000 containing 3000 vertices and 29,177 edges; (<b>e</b>) Pokec 4000 containing 4000 vertices and 41,363 edges; (<b>f</b>) Pokec 5000 containing 5000 vertices and 52,182 edges.</p>
Full article ">Figure 3 Cont.
<p>Results of modified Fruchterman–Reingold algorithm for 3D implementation rendered as the default view with no additional user interaction in 3D: (<b>a</b>) Pokec 500 containing 500 vertices and 3084 edges; (<b>b</b>) Pokec 1000 containing 1000 vertices and 6297 edges; (<b>c</b>) Pokec 2000 containing 2000 vertices and 18,313 edges; (<b>d</b>) Pokec 3000 containing 3000 vertices and 29,177 edges; (<b>e</b>) Pokec 4000 containing 4000 vertices and 41,363 edges; (<b>f</b>) Pokec 5000 containing 5000 vertices and 52,182 edges.</p>
Full article ">Figure 4
<p>Results of force-directed algorithm with springs and controlled placement rendered as the default view with no additional user interaction in 3D: (<b>a</b>) Pokec 500 containing 500 vertices and 3084 edges; (<b>b</b>) Pokec 1000 containing 1000 vertices and 6297 edges; (<b>c</b>) Pokec 2000 containing 2000 vertices and 18,313 edges; (<b>d</b>) Pokec 3000 containing 3000 vertices and 29,177 edges; (<b>e</b>) Pokec 4000 containing 4000 vertices and 41,363 edges; (<b>f</b>) Pokec 5000 containing 5000 vertices and 52,182 edges.</p>
Full article ">Figure 4 Cont.
<p>Results of force-directed algorithm with springs and controlled placement rendered as the default view with no additional user interaction in 3D: (<b>a</b>) Pokec 500 containing 500 vertices and 3084 edges; (<b>b</b>) Pokec 1000 containing 1000 vertices and 6297 edges; (<b>c</b>) Pokec 2000 containing 2000 vertices and 18,313 edges; (<b>d</b>) Pokec 3000 containing 3000 vertices and 29,177 edges; (<b>e</b>) Pokec 4000 containing 4000 vertices and 41,363 edges; (<b>f</b>) Pokec 5000 containing 5000 vertices and 52,182 edges.</p>
Full article ">Figure 5
<p>Evaluation metric results for implemented algorithms.</p>
Full article ">Figure 6
<p>Results of force-directed algorithm with springs and controlled placement for Pokec 1000 dataset containing 1000 vertices and 6297 edges in comparison with (<b>a</b>) Fruchterman–Reingold modification for 3D and (<b>b</b>) naïve spring joint algorithm.</p>
Full article ">Figure 6 Cont.
<p>Results of force-directed algorithm with springs and controlled placement for Pokec 1000 dataset containing 1000 vertices and 6297 edges in comparison with (<b>a</b>) Fruchterman–Reingold modification for 3D and (<b>b</b>) naïve spring joint algorithm.</p>
Full article ">
22 pages, 3039 KiB  
Article
Measuring Undergraduates’ Motivation Levels When Learning to Program in Virtual Worlds
by Juan Gabriel López Solórzano, Christian Jonathan Ángel Rueda and Osslan Osiris Vergara Villegas
Computers 2024, 13(8), 188; https://doi.org/10.3390/computers13080188 - 31 Jul 2024
Viewed by 1113
Abstract
Teaching/learning programming is complex, and conventional classes often fail to arouse students’ motivation in this discipline. Therefore, teachers should look for alternative methods for teaching programming. Information and communication technologies (ICTs) can be a valuable alternative, especially virtual worlds. This study measures the [...] Read more.
Teaching/learning programming is complex, and conventional classes often fail to arouse students’ motivation in this discipline. Therefore, teachers should look for alternative methods for teaching programming. Information and communication technologies (ICTs) can be a valuable alternative, especially virtual worlds. This study measures the students’ motivation level when using virtual worlds to learn introductory programming skills. Moreover, a comparison is conducted regarding their motivation levels when students learn in a traditional teaching setting. In this study, first-semester university students participated in a pedagogical experiment regarding the learning of the programming subject employing virtual worlds. A pre-test-post-test design was carried out. In the pre-test, 102 students participated, and the motivation level when a professor taught in a traditional modality was measured. Then, a post-test was applied to 60 students learning in virtual worlds. With this research, we have found that the activity conducted with virtual worlds presents higher motivation levels than traditional learning with the teacher. Moreover, regarding gender, women present higher confidence than men. We recommend that teachers try this innovation with their students based on our findings. However, teachers must design a didactic model to integrate virtual worlds into daily teaching activities. Full article
(This article belongs to the Special Issue Future Trends in Computer Programming Education)
Show Figures

Figure 1

Figure 1
<p>Example of an agent in MEE.</p>
Full article ">Figure 2
<p>Elements used in MEE for learning functions.</p>
Full article ">Figure 3
<p>View of the space built in MEE.</p>
Full article ">Figure 4
<p>The code editor in MEE.</p>
Full article ">Figure 5
<p>The final activity in MEE.</p>
Full article ">Figure 6
<p>The bonus activity in MEE.</p>
Full article ">Figure 7
<p>MEE controls for mobile devices. The inventory uses a number for each slot.</p>
Full article ">Figure 8
<p>Phases for designing the didactic material used in MEE.</p>
Full article ">Figure 9
<p>Workflow of the study.</p>
Full article ">Figure 10
<p>Attention in MEE.</p>
Full article ">Figure 11
<p>Attention teacher’s material.</p>
Full article ">Figure 12
<p>Relevance in MEE.</p>
Full article ">Figure 13
<p>Relevance of teacher’s material.</p>
Full article ">Figure 14
<p>Confidence in MEE.</p>
Full article ">Figure 15
<p>Confidence in the teacher’s material.</p>
Full article ">Figure 16
<p>Satisfaction in MEE.</p>
Full article ">Figure 17
<p>Satisfaction with the teacher’s material.</p>
Full article ">Figure 18
<p>ARCS comparison by gender. The circles correspond to outliers.</p>
Full article ">Figure 19
<p>ARCS pre-test and post-test results. The circles correspond to outliers.</p>
Full article ">
31 pages, 2905 KiB  
Article
On Using GeoGebra and ChatGPT for Geometric Discovery
by Francisco Botana, Tomas Recio and María Pilar Vélez
Computers 2024, 13(8), 187; https://doi.org/10.3390/computers13080187 - 30 Jul 2024
Viewed by 1871
Abstract
This paper explores the performance of ChatGPT and GeoGebra Discovery when dealing with automatic geometric reasoning and discovery. The emergence of Large Language Models has attracted considerable attention in mathematics, among other fields where intelligence should be present. We revisit a couple of [...] Read more.
This paper explores the performance of ChatGPT and GeoGebra Discovery when dealing with automatic geometric reasoning and discovery. The emergence of Large Language Models has attracted considerable attention in mathematics, among other fields where intelligence should be present. We revisit a couple of elementary Euclidean geometry theorems discussed in the birth of Artificial Intelligence and a non-trivial inequality concerning triangles. GeoGebra succeeds in proving all these selected examples, while ChatGPT fails in one case. Our thesis is that both GeoGebra and ChatGPT could be used as complementary systems, where the natural language abilities of ChatGPT and the certified computer algebra methods in GeoGebra Discovery can cooperate in order to obtain sound and—more relevant—interesting results. Full article
(This article belongs to the Special Issue Natural Language Processing (NLP) and Large Language Modelling)
Show Figures

Figure 1

Figure 1
<p>Statement of Theorem 1 (taken from [<a href="#B4-computers-13-00187" class="html-bibr">4</a>]).</p>
Full article ">Figure 2
<p>Using <tt>Relation</tt> to check the parallelism of lines <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>F</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>G</mi> <mi>H</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Discovering properties on <span class="html-italic">E</span> to conclude that <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>F</mi> <mi>G</mi> <mi>H</mi> </mrow> </semantics></math> is a parallelogram.</p>
Full article ">Figure 4
<p>Final steps of ShowProof when proving the parallelism of <math display="inline"><semantics> <mrow> <mi>f</mi> <mo>=</mo> <mi>E</mi> <mi>F</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>g</mi> <mo>=</mo> <mi>G</mi> <mi>H</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Theorem 2 from Appendix 2 in [<a href="#B4-computers-13-00187" class="html-bibr">4</a>], with an extra point <span class="html-italic">K</span>.</p>
Full article ">Figure 6
<p>GeoGebra Discovery discovers, and verifies, the equality of segments <math display="inline"><semantics> <mrow> <mi>j</mi> <mo>,</mo> <mi>k</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>GeoGebra Discovery declares that it can neither prove nor disprove the equality of segments <math display="inline"><semantics> <mrow> <mi>j</mi> <mo>,</mo> <mi>k</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>GeoGebra Discovery verifies the truth of <math display="inline"><semantics> <mrow> <msup> <mi>j</mi> <mn>2</mn> </msup> <mo>=</mo> <msup> <mi>k</mi> <mn>2</mn> </msup> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>GeoGebra Discovery estimates the complexity of the MEP variant of Theorem 2.</p>
Full article ">Figure 10
<p>GeoGebra Discovery confirms that the inequality: <math display="inline"><semantics> <mrow> <msup> <mi>a</mi> <mn>6</mn> </msup> <mo>+</mo> <msup> <mi>b</mi> <mn>6</mn> </msup> <mo>+</mo> <msup> <mi>c</mi> <mn>6</mn> </msup> <mo>&gt;</mo> <mo>=</mo> <mn>5184</mn> <msup> <mi>r</mi> <mn>6</mn> </msup> </mrow> </semantics></math> holds.</p>
Full article ">Figure 11
<p>Viewing proof of the inequality through ShowProof. Initial steps.</p>
Full article ">Figure 12
<p>Viewing proof of the inequality through ShowProof. Intermediate steps.</p>
Full article ">Figure 13
<p>Viewing proof of the inequality through ShowProof. Final steps.</p>
Full article ">Figure 14
<p>ChatGPT proof of the inequality (1/5).</p>
Full article ">Figure 15
<p>ChatGPT proof of the inequality (2/5).</p>
Full article ">Figure 16
<p>ChatGPT proof of the inequality (3/5).</p>
Full article ">Figure 17
<p>ChatGPT proof of the inequality (4/5).</p>
Full article ">Figure 18
<p>ChatGPT proof of the inequality (5/5).</p>
Full article ">Figure 19
<p>GeoGebra discovers (and verifies) Weitzenböck’s inequality, included by ChatGPT in the proof of AMM Problem 11984 [<a href="#B15-computers-13-00187" class="html-bibr">15</a>].</p>
Full article ">Figure A1
<p>Image describing context of Theorem 1.</p>
Full article ">
18 pages, 2365 KiB  
Article
6G-RUPA: A Flexible, Scalable, and Energy-Efficient User Plane Architecture for Next-Generation Mobile Networks
by Sergio Giménez-Antón, Eduard Grasa, Jordi Perelló and Andrés Cárdenas
Computers 2024, 13(8), 186; https://doi.org/10.3390/computers13080186 - 25 Jul 2024
Viewed by 1087
Abstract
As the global deployment of Fifth Generation (5G) is being well consolidated, the exploration of Sixth Generation (6G) wireless networks has intensified, focusing on novel Key Performance Indicators (KPIs) and Key Value Indicators (KVIs) that extend beyond traditional metrics like throughput and latency. [...] Read more.
As the global deployment of Fifth Generation (5G) is being well consolidated, the exploration of Sixth Generation (6G) wireless networks has intensified, focusing on novel Key Performance Indicators (KPIs) and Key Value Indicators (KVIs) that extend beyond traditional metrics like throughput and latency. As 5G begins transitioning to vertical-oriented applications, 6G aims go beyond, providing a ubiquitous communication experience by integrating diverse Radio Access Networks (RANs) and fixed-access networks to form a hyper-converged edge. This unified platform will enable seamless network federation, thus realizing the so-called network of networks vision. Emphasizing energy efficiency, the present paper discusses the importance of reducing telecommunications’ environmental impact, aligning with global sustainability goals. Central to this vision is the proposal of a novel user plane network protocol architecture, called 6G Recursive User Plane Architecture (6G-RUPA), designed to be scalable, flexible, and energy-efficient. Briefly, 6G-RUPA offers superior flexibility in network adaptation, federation, scalability, and mobility management, aiming to enhance overall network performance and sustainability. This study provides a comprehensive analysis of 6G’s potential, from its conceptual framework to the high-level design of 6G-RUPA, addressing current challenges and proposing actionable solutions for next-generation mobile networks. Full article
(This article belongs to the Special Issue Advances in High-Performance Switching and Routing)
Show Figures

Figure 1

Figure 1
<p>Typical mobile communications network topology.</p>
Full article ">Figure 2
<p>Evolution of user plane protocols from 3G (first commercial deployment: 2001) to 5G (first commercial deployment: 2018).</p>
Full article ">Figure 3
<p>The 5G user plane protocol stack for a typical mobile network deployment.</p>
Full article ">Figure 4
<p>Abstract syntax of an EFCP data transfer PDU.</p>
Full article ">Figure 5
<p>A 6G-RUPA user plane protocol stack for typical mobile network deployment.</p>
Full article ">Figure 6
<p>A <span class="html-italic">network of networks</span> conceptual scenario.</p>
Full article ">Figure 7
<p>Home-routed roaming 5G protocol stack scenario vs. 6G-RUPA approach.</p>
Full article ">Figure 8
<p>User plane protocols of a regenerative architecture LEO constellation deployment.</p>
Full article ">
22 pages, 4930 KiB  
Review
Quantum Image Compression: Fundamentals, Algorithms, and Advances
by Sowmik Kanti Deb and W. David Pan
Computers 2024, 13(8), 185; https://doi.org/10.3390/computers13080185 - 25 Jul 2024
Viewed by 1479
Abstract
Quantum computing has emerged as a transformative paradigm, with revolutionary potential in numerous fields, including quantum image processing and compression. Applications that depend on large scale image data could benefit greatly from parallelism and quantum entanglement, which would allow images to be encoded [...] Read more.
Quantum computing has emerged as a transformative paradigm, with revolutionary potential in numerous fields, including quantum image processing and compression. Applications that depend on large scale image data could benefit greatly from parallelism and quantum entanglement, which would allow images to be encoded and decoded with unprecedented efficiency and data reduction capability. This paper provides a comprehensive overview of the rapidly evolving field of quantum image compression, including its foundational principles, methods, challenges, and potential uses. The paper will also feature a thorough exploration of the fundamental concepts of quantum qubits as image pixels, quantum gates as image transformation tools, quantum image representation, as well as basic quantum compression operations. Our survey shows that work is still sparse on the practical implementation of quantum image compression algorithms on physical quantum computers. Thus, further research is needed in order to attain the full advantage and potential of quantum image compression algorithms on large-scale fault-tolerant quantum computers. Full article
(This article belongs to the Special Issue Advanced Image Processing and Computer Vision)
Show Figures

Figure 1

Figure 1
<p>The processing steps of quantum image processing, converting the image from classical state to quantum state, then processing in quantum state, next convert the processed image from quantum to classical state as output.</p>
Full article ">Figure 2
<p>Unit circle representation on various angles. The vector [1/√2 1/√2]<sup>T</sup> can be used to represent a vector that forms a 45-degree angle with the X-axis and there is an equal chance that qubit will be measured and found in the states of |0⟩ or |1⟩. Another vector that forms a 60-degree angle with the X-axis can be represented by the column vector [1/2 √(3/2)]. This vector represents a quantum state that is not an equal superposition of |0⟩ and |1⟩.</p>
Full article ">Figure 3
<p>Projection on standard basis states. State |S⟩ has an angle θ with |0⟩ state in X-axis. Then the angle of |S⟩ with |1⟩ state would be (π/2 − θ).</p>
Full article ">Figure 4
<p>Projection onto arbitrary orthogonal basis states. State |S⟩ is measured with respect to |u⟩ and |u′⟩. |u⟩ and |u′⟩ is measured with probability of cos<sup>2</sup> θ and sin<sup>2</sup> θ, respectively.</p>
Full article ">Figure 5
<p>Single quantum gate.</p>
Full article ">Figure 6
<p>A 2-by-2 example image where (240)<sub>10</sub> and (11110000)<sub>2</sub> is the intensity of pixel in decimal and binary at position 00. Same goes for other three pixels.</p>
Full article ">Figure 7
<p>A 2-by-2 image represented in a quantum circuit by using the NEQR scheme.</p>
Full article ">Figure 8
<p>Workflow of JPEG based quantum image compression algorithm.</p>
Full article ">Figure 9
<p>Two color 8 × 8 pixel image, 8 blue pixels and 56 red pixels.</p>
Full article ">Figure 10
<p>Minimized circuit for a two-color 8 × 8 pixel image. Here, X is the Pauli-X gates, <span class="html-italic">θ</span> is the vector of angles encoding colors (two in this case) and R<sub>y</sub>(2<span class="html-italic">θ</span><sub>i</sub>) is the controlled-rotation gate.</p>
Full article ">Figure 11
<p>Boolean expression and its minimized expression for an 8-position group.</p>
Full article ">Figure 12
<p>Quantum image compression flow chart.</p>
Full article ">Figure 13
<p>Scanning a 3-color 8 × 8 image by rows (indicated by the purple line) starting from the second pixel of the first row (1,2), and by columns (indicated by the yellow line) starting from the second row’s first pixel (2,1).</p>
Full article ">Figure 14
<p>The compressed image stored in Q1 and Q2.</p>
Full article ">Figure 15
<p>Workflow of image compression in the NEQR algorithm.</p>
Full article ">
Previous Issue
Back to TopTop